Ticket #24367: 24367_d7833c9d27feed9_obfs3_obfs4.log

File 24367_d7833c9d27feed9_obfs3_obfs4.log, 137.3 KB (added by gk, 2 months ago)
Line 
1Nov 22 11:36:49.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening new log file.
2Nov 22 11:36:49.390 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.0g, Zlib 1.2.8, Liblzma 5.2.2, and Libzstd 1.3.2.
3Nov 22 11:36:49.391 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
4Nov 22 11:36:49.391 [notice] This version is not a stable Tor release. Expect more bugs than usual.
5Nov 22 11:36:49.391 [notice] Read configuration file "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc-defaults".
6Nov 22 11:36:49.391 [notice] Read configuration file "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc".
7Nov 22 11:36:49.394 [notice] Scheduler type KIST has been enabled.
8Nov 22 11:36:49.394 [notice] Opening Control listener on 127.0.0.1:9151
9Nov 22 11:36:49.394 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
10Nov 22 11:36:49.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
11Nov 22 11:36:49.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
12Nov 22 11:36:49.000 [info] tor_lockfile_lock(): Locking "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/lock"
13Nov 22 11:36:49.000 [info] or_state_load(): Initialized state
14Nov 22 11:36:49.000 [info] circuit_build_times_parse_state(): Adding 0 timeouts.
15Nov 22 11:36:49.000 [info] circuit_build_times_parse_state(): Loaded 0/0 values from 0 lines in circuit time histogram
16Nov 22 11:36:49.000 [info] or_state_save(): Saved state to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/state"
17Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/router-stability": No such file or directory
18Nov 22 11:36:49.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/control_auth_cookie"'.
19Nov 22 11:36:49.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
20Nov 22 11:36:49.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
21Nov 22 11:36:49.000 [notice] Parsing GEOIP IPv4 file /home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/geoip.
22Nov 22 11:36:49.000 [notice] Parsing GEOIP IPv6 file /home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/geoip6.
23Nov 22 11:36:49.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 2673 more seconds.
24Nov 22 11:36:49.000 [info] crypto_global_init(): NOT using OpenSSL engine support.
25Nov 22 11:36:49.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
26Nov 22 11:36:49.000 [notice] Bootstrapped 0%: Starting
27Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-certs": No such file or directory
28Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-consensus": No such file or directory
29Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/unverified-consensus": No such file or directory
30Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdesc-consensus": No such file or directory
31Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/unverified-microdesc-consensus": No such file or directory
32Nov 22 11:36:49.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdescs" for mmap(): No such file or directory
33Nov 22 11:36:49.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdescs.new": No such file or directory
34Nov 22 11:36:49.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 0 descriptors.
35Nov 22 11:36:49.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-descriptors" for mmap(): No such file or directory
36Nov 22 11:36:49.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-extrainfo" for mmap(): No such file or directory
37Nov 22 11:36:49.000 [notice] Starting with guard context "default"
38Nov 22 11:36:49.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
39Nov 22 11:36:49.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
40Nov 22 11:36:49.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
41Nov 22 11:36:49.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
42Nov 22 11:36:49.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 0 guards to consider.)
43Nov 22 11:36:49.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
44Nov 22 11:36:49.000 [notice] Delaying directory fetches: DisableNetwork is set.
45Nov 22 11:36:49.000 [info] I learned some more directory information, but not enough to build a circuit: DisableNetwork is set.
46Nov 22 11:36:49.000 [notice] New control connection opened from 127.0.0.1.
47Nov 22 11:36:49.000 [info] handle_control_authenticate(): Authenticated control connection (15)
48Nov 22 11:36:49.000 [info] handle_control_takeownership(): Control connection 15 has taken ownership of this Tor instance.
49Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
50Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
51Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
52Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
53Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
54Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
55Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
56Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
57Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
58Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
59Nov 22 11:36:49.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
60Nov 22 11:36:49.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
61Nov 22 11:36:49.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
62Nov 22 11:36:49.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
63Nov 22 11:36:49.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
64Nov 22 11:36:49.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
65Nov 22 11:36:49.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
66Nov 22 11:36:49.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
67Nov 22 11:36:49.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
68Nov 22 11:36:49.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
69Nov 22 11:36:49.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 0 guards to consider.)
70Nov 22 11:36:49.000 [notice] New control connection opened from 127.0.0.1.
71Nov 22 11:36:49.000 [info] handle_control_authenticate(): Authenticated control connection (9)
72Nov 22 11:36:50.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
73Nov 22 11:36:50.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
74Nov 22 11:36:50.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
75Nov 22 11:36:51.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
76Nov 22 11:36:51.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
77Nov 22 11:36:51.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
78Nov 22 11:36:52.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
79Nov 22 11:36:52.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
80Nov 22 11:36:52.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
81Nov 22 11:36:53.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
82Nov 22 11:36:53.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
83Nov 22 11:36:53.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
84Nov 22 11:36:54.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
85Nov 22 11:36:54.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
86Nov 22 11:36:54.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
87Nov 22 11:36:55.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
88Nov 22 11:36:55.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
89Nov 22 11:36:55.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
90Nov 22 11:36:56.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
91Nov 22 11:36:56.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
92Nov 22 11:36:56.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
93Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
94Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
95Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
96Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
97Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
98Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
99Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
100Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
101Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
102Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
103Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
104Nov 22 11:36:57.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
105Nov 22 11:36:57.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
106Nov 22 11:36:57.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
107Nov 22 11:36:57.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
108Nov 22 11:36:57.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
109Nov 22 11:36:57.000 [info] options_act(): Changed to using entry guards or bridges, or changed preferred or excluded node lists. Abandoning previous circuits.
110Nov 22 11:36:57.000 [notice] Switching to guard context "bridges" (was using "default")
111Nov 22 11:36:57.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
112Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
113Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
114Nov 22 11:36:57.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 0 guards in the sample, and 5 eligible guards to extend it with.
115Nov 22 11:36:57.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards
116Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 5 guards to consider.)
117Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9).)
118Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 5 in the USABLE_FILTERED set.
119Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
120Nov 22 11:36:57.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 0 eligible guards to extend it with.
121Nov 22 11:36:57.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards
122Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 4 guards to consider.)
123Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239).)
124Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 5 in the USABLE_FILTERED set.
125Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
126Nov 22 11:36:57.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 0 eligible guards to extend it with.
127Nov 22 11:36:57.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards
128Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 3 guards to consider.)
129Nov 22 11:36:57.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9).)
130Nov 22 11:36:57.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
131Nov 22 11:36:57.000 [info] entry_guards_update_primary():   1/3: [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9)
132Nov 22 11:36:57.000 [info] entry_guards_update_primary():   2/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
133Nov 22 11:36:57.000 [info] entry_guards_update_primary():   3/3: [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9)
134Nov 22 11:36:57.000 [info] update_consensus_networkstatus_fetch_time_impl(): No live microdesc consensus; we should fetch one immediately.
135Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
136Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
137Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
138Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
139Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
140Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
141Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
142Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
143Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
144Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
145Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
146Nov 22 11:36:57.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
147Nov 22 11:36:57.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
148Nov 22 11:36:57.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
149Nov 22 11:36:57.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
150Nov 22 11:36:57.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
151Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
152Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
153Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
154Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
155Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
156Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
157Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
158Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
159Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
160Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
161Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
162Nov 22 11:36:57.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
163Nov 22 11:36:57.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
164Nov 22 11:36:57.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
165Nov 22 11:36:57.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
166Nov 22 11:36:57.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
167Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
168Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
169Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
170Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
171Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
172Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
173Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
174Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
175Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
176Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
177Nov 22 11:36:57.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
178Nov 22 11:36:57.000 [notice] Opening Socks listener on 127.0.0.1:9150
179Nov 22 11:36:57.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
180Nov 22 11:36:57.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
181Nov 22 11:36:57.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec ./TorBrowser/Tor/PluggableTransports/fteproxy.bin --managed) does not provide any needed transports and will not be launched.
182Nov 22 11:36:57.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec ./TorBrowser/Tor/PluggableTransports/meek-client-torbrowser -- ./TorBrowser/Tor/PluggableTransports/meek-client) does not provide any needed transports and will not be launched.
183Nov 22 11:36:57.000 [info] parse_transport_line(): Pluggable transport proxy (snowflake exec ./TorBrowser/Tor/PluggableTransports/snowflake-client -url https://snowflake-reg.appspot.com/ -front www.google.com -ice stun:stun.l.google.com:19302) does not provide any needed transports and will not be launched.
184Nov 22 11:36:57.000 [info] launch_managed_proxy(): Managed proxy at './TorBrowser/Tor/PluggableTransports/obfs4proxy' has spawned with PID '24169'.
185Nov 22 11:36:57.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
186Nov 22 11:36:57.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
187Nov 22 11:36:57.000 [notice] Renaming old configuration file to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc.orig.1"
188Nov 22 11:36:57.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
189Nov 22 11:36:57.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
190Nov 22 11:36:57.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
191Nov 22 11:36:57.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (VERSION 1)
192Nov 22 11:36:57.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs2 socks5 127.0.0.1:39571)
193Nov 22 11:36:57.000 [info] parse_cmethod_line(): Transport obfs2 at 127.0.0.1:39571 with SOCKS 3. Attached to managed proxy.
194Nov 22 11:36:57.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs3 socks5 127.0.0.1:39223)
195Nov 22 11:36:57.000 [info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:39223 with SOCKS 3. Attached to managed proxy.
196Nov 22 11:36:57.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs4 socks5 127.0.0.1:44015)
197Nov 22 11:36:57.000 [info] parse_cmethod_line(): Transport obfs4 at 127.0.0.1:44015 with SOCKS 3. Attached to managed proxy.
198Nov 22 11:36:57.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD scramblesuit socks5 127.0.0.1:38397)
199Nov 22 11:36:57.000 [info] parse_cmethod_line(): Transport scramblesuit at 127.0.0.1:38397 with SOCKS 3. Attached to managed proxy.
200Nov 22 11:36:57.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHODS DONE)
201Nov 22 11:36:57.000 [info] handle_methods_done(): Client managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy' configuration completed!
202Nov 22 11:36:57.000 [info] register_client_proxy(): Successfully registered transport obfs2
203Nov 22 11:36:57.000 [info] register_client_proxy(): Successfully registered transport obfs3
204Nov 22 11:36:57.000 [info] register_client_proxy(): Successfully registered transport obfs4
205Nov 22 11:36:57.000 [info] register_client_proxy(): Successfully registered transport scramblesuit
206Nov 22 11:36:58.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
207Nov 22 11:36:58.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
208Nov 22 11:36:58.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
209Nov 22 11:36:58.000 [info] connection_ap_make_link(): ... application connection created and linked.
210Nov 22 11:36:58.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
211Nov 22 11:36:58.000 [info] connection_ap_make_link(): ... application connection created and linked.
212Nov 22 11:36:58.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:31493 ...
213Nov 22 11:36:58.000 [info] connection_ap_make_link(): ... application connection created and linked.
214Nov 22 11:36:58.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:46328 ...
215Nov 22 11:36:58.000 [info] connection_ap_make_link(): ... application connection created and linked.
216Nov 22 11:36:58.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
217Nov 22 11:36:58.000 [info] connection_ap_make_link(): ... application connection created and linked.
218Nov 22 11:36:58.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
219Nov 22 11:36:58.000 [info] onion_pick_cpath_exit(): Using requested exit node '$1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~1E05F577A0EC0213F97 at 109.105.109.163'
220Nov 22 11:36:58.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
221Nov 22 11:36:58.000 [notice] Bootstrapped 5%: Connecting to directory server
222Nov 22 11:36:58.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 199.
223Nov 22 11:36:58.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850cbf0 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED <unset>.
224Nov 22 11:36:58.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
225Nov 22 11:36:58.000 [info] onion_pick_cpath_exit(): Using requested exit node '$4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~4C331FA9B3D1D6D8FB0 at 109.105.109.163'
226Nov 22 11:36:58.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
227Nov 22 11:36:58.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 222.
228Nov 22 11:36:58.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850d950 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A <unset>.
229Nov 22 11:36:58.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
230Nov 22 11:36:58.000 [info] onion_pick_cpath_exit(): Using requested exit node '$AF9F66B7B04F8FF6F32D455F05135250A16543C9~AF9F66B7B04F8FF6F32 at 169.229.59.74'
231Nov 22 11:36:58.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
232Nov 22 11:36:58.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 223.
233Nov 22 11:36:58.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850e400 ([scrubbed]): AF9F66B7B04F8FF6F32D455F05135250A16543C9 <unset>.
234Nov 22 11:36:58.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
235Nov 22 11:36:58.000 [info] onion_pick_cpath_exit(): Using requested exit node '$A09D536DD1752D542E1FBB3C9CE4449D51298239~A09D536DD1752D542E1 at 83.212.101.3'
236Nov 22 11:36:58.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
237Nov 22 11:36:58.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 264.
238Nov 22 11:36:58.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850ef20 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 <unset>.
239Nov 22 11:36:58.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
240Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
241Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
242Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
243Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
244Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
245Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
246Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
247Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
248Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
249Nov 22 11:36:58.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
250Nov 22 11:36:58.000 [notice] Bootstrapped 10%: Finishing handshake with directory server
251Nov 22 11:36:58.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
252Nov 22 11:36:58.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
253Nov 22 11:36:58.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
254Nov 22 11:36:58.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
255Nov 22 11:36:58.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:38980 successful
256Nov 22 11:36:58.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:47779 successful
257Nov 22 11:36:58.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:47779; Waiting for CERTS cell
258Nov 22 11:36:58.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x55c24850d950 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A, MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk
259Nov 22 11:36:58.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection.
260Nov 22 11:36:58.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850d950 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk.
261Nov 22 11:36:58.000 [info] connection_or_set_identity_digest():    (Previously: 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A <unset>)
262Nov 22 11:36:58.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:47779: Authenticated it with RSA and Ed25519
263Nov 22 11:36:58.000 [info] connection_or_set_canonical(): Channel 2 chose an idle timeout of 184.
264Nov 22 11:36:58.000 [notice] Bootstrapped 15%: Establishing an encrypted directory connection
265Nov 22 11:36:58.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
266Nov 22 11:36:58.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:47779; OR connection is now open, using protocol version 5. Its ID digest is 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A. Our address is apparently 151.177.15.217.
267Nov 22 11:36:58.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:38980; Waiting for CERTS cell
268Nov 22 11:36:58.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x55c24850cbf0 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED, lR1FYvChO8Oh8cjGgo5gGGLayzeiYX3D9oUOuKUcito
269Nov 22 11:36:58.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection.
270Nov 22 11:36:58.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850cbf0 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED lR1FYvChO8Oh8cjGgo5gGGLayzeiYX3D9oUOuKUcito.
271Nov 22 11:36:58.000 [info] connection_or_set_identity_digest():    (Previously: 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED <unset>)
272Nov 22 11:36:58.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:38980: Authenticated it with RSA and Ed25519
273Nov 22 11:36:58.000 [info] connection_or_set_canonical(): Channel 1 chose an idle timeout of 190.
274Nov 22 11:36:58.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
275Nov 22 11:36:58.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:38980; OR connection is now open, using protocol version 5. Its ID digest is 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED. Our address is apparently 151.177.15.217.
276Nov 22 11:36:58.000 [info] circuit_finish_handshake(): Finished building circuit hop:
277Nov 22 11:36:58.000 [info] internal circ (length 1, last hop 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
278Nov 22 11:36:58.000 [info] circuit_build_no_more_hops(): circuit built!
279Nov 22 11:36:58.000 [notice] Bootstrapped 20%: Asking for networkstatus consensus
280Nov 22 11:36:58.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
281Nov 22 11:36:58.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
282Nov 22 11:36:58.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2359287131 to begin stream 45293.
283Nov 22 11:36:58.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2359287131
284Nov 22 11:36:58.000 [info] connection_ap_handshake_send_begin(): Sending up to 131 + 0 bytes of queued-up data
285Nov 22 11:36:58.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2359287131 streamid 45293 after 0 seconds.
286Nov 22 11:36:58.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
287Nov 22 11:36:58.000 [info] circuit_finish_handshake(): Finished building circuit hop:
288Nov 22 11:36:58.000 [info] internal circ (length 1, last hop 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
289Nov 22 11:36:58.000 [info] circuit_build_no_more_hops(): circuit built!
290Nov 22 11:36:58.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
291Nov 22 11:36:58.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
292Nov 22 11:36:58.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27020.
293Nov 22 11:36:58.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
294Nov 22 11:36:58.000 [info] connection_ap_handshake_send_begin(): Sending up to 131 + 0 bytes of queued-up data
295Nov 22 11:36:58.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 45293. Removing stream.
296Nov 22 11:36:58.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
297Nov 22 11:36:58.000 [info] make_guard_confirmed(): Marking [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) as a confirmed guard (index 0)
298Nov 22 11:36:58.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
299Nov 22 11:36:58.000 [info] entry_guards_update_primary():   1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) (confirmed)
300Nov 22 11:36:58.000 [info] entry_guards_update_primary():   2/3: [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9)
301Nov 22 11:36:58.000 [info] entry_guards_update_primary():   3/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
302Nov 22 11:36:58.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A)
303Nov 22 11:36:58.000 [info] handle_response_fetch_desc(): Received server info (body size 2243) from server '109.105.109.163:47779'
304Nov 22 11:36:58.000 [info] router_load_routers_from_string(): 1 elements to add
305Nov 22 11:36:58.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'ndnop2' to match configured address 109.105.109.163:47779.
306Nov 22 11:36:58.000 [notice] new bridge descriptor 'ndnop2' (fresh): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~ndnop2 at 109.105.109.163
307Nov 22 11:36:58.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
308Nov 22 11:36:58.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
309Nov 22 11:36:58.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
310Nov 22 11:36:58.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27020 after 0 seconds.
311Nov 22 11:36:58.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
312Nov 22 11:36:58.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27020. Removing stream.
313Nov 22 11:36:58.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
314Nov 22 11:36:58.000 [info] make_guard_confirmed(): Marking [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) as a confirmed guard (index 1)
315Nov 22 11:36:58.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
316Nov 22 11:36:58.000 [info] entry_guards_update_primary():   1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) (confirmed)
317Nov 22 11:36:58.000 [info] entry_guards_update_primary():   2/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) (confirmed)
318Nov 22 11:36:58.000 [info] entry_guards_update_primary():   3/3: [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9)
319Nov 22 11:36:58.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
320Nov 22 11:36:58.000 [info] handle_response_fetch_desc(): Received server info (body size 2241) from server '109.105.109.163:38980'
321Nov 22 11:36:58.000 [info] router_load_routers_from_string(): 1 elements to add
322Nov 22 11:36:58.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'ndnop0' to match configured address 109.105.109.163:38980.
323Nov 22 11:36:58.000 [notice] new bridge descriptor 'ndnop0' (fresh): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~ndnop0 at 109.105.109.163
324Nov 22 11:36:58.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
325Nov 22 11:36:58.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
326Nov 22 11:36:58.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
327Nov 22 11:36:58.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 83.212.101.3:80 successful
328Nov 22 11:36:59.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:80; Waiting for CERTS cell
329Nov 22 11:36:59.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x55c24850ef20 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239, qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w
330Nov 22 11:36:59.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection.
331Nov 22 11:36:59.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c24850ef20 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w.
332Nov 22 11:36:59.000 [info] connection_or_set_identity_digest():    (Previously: A09D536DD1752D542E1FBB3C9CE4449D51298239 <unset>)
333Nov 22 11:36:59.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:80: Authenticated it with RSA and Ed25519
334Nov 22 11:36:59.000 [info] connection_or_set_canonical(): Channel 4 chose an idle timeout of 185.
335Nov 22 11:36:59.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
336Nov 22 11:36:59.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:80; OR connection is now open, using protocol version 4. Its ID digest is A09D536DD1752D542E1FBB3C9CE4449D51298239. Our address is apparently 151.177.15.217.
337Nov 22 11:36:59.000 [info] circuit_finish_handshake(): Finished building circuit hop:
338Nov 22 11:36:59.000 [info] internal circ (length 1, last hop A09D536DD1752D542E1FBB3C9CE4449D51298239): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
339Nov 22 11:36:59.000 [info] circuit_build_no_more_hops(): circuit built!
340Nov 22 11:36:59.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
341Nov 22 11:36:59.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
342Nov 22 11:36:59.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16364.
343Nov 22 11:36:59.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
344Nov 22 11:36:59.000 [info] connection_ap_handshake_send_begin(): Sending up to 122 + 0 bytes of queued-up data
345Nov 22 11:36:59.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16364 after 0 seconds.
346Nov 22 11:36:59.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
347Nov 22 11:36:59.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16364. Removing stream.
348Nov 22 11:36:59.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
349Nov 22 11:36:59.000 [info] make_guard_confirmed(): Marking [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) as a confirmed guard (index 2)
350Nov 22 11:36:59.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
351Nov 22 11:36:59.000 [info] entry_guards_update_primary():   1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) (confirmed)
352Nov 22 11:36:59.000 [info] entry_guards_update_primary():   2/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) (confirmed)
353Nov 22 11:36:59.000 [info] entry_guards_update_primary():   3/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) (confirmed)
354Nov 22 11:36:59.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
355Nov 22 11:36:59.000 [info] handle_response_fetch_desc(): Received server info (body size 2240) from server '83.212.101.3:80'
356Nov 22 11:36:59.000 [info] router_load_routers_from_string(): 1 elements to add
357Nov 22 11:36:59.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'LeifEricson' to match configured address 83.212.101.3:80.
358Nov 22 11:36:59.000 [notice] new bridge descriptor 'LeifEricson' (fresh): $A09D536DD1752D542E1FBB3C9CE4449D51298239~LeifEricson at 83.212.101.3
359Nov 22 11:36:59.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
360Nov 22 11:36:59.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
361Nov 22 11:36:59.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
362Nov 22 11:36:59.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download.
363Nov 22 11:36:59.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
364Nov 22 11:36:59.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
365Nov 22 11:36:59.000 [info] connection_ap_make_link(): ... application connection created and linked.
366Nov 22 11:36:59.000 [info] directory_send_command(): Downloading consensus from 83.212.101.3 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
367Nov 22 11:36:59.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
368Nov 22 11:36:59.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
369Nov 22 11:36:59.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16365.
370Nov 22 11:36:59.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
371Nov 22 11:36:59.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=208
372Nov 22 11:36:59.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=208
373Nov 22 11:36:59.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16365 after 0 seconds.
374Nov 22 11:36:59.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
375Nov 22 11:36:59.000 [notice] Bootstrapped 25%: Loading networkstatus consensus
376Nov 22 11:37:00.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16365. Removing stream.
377Nov 22 11:37:00.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
378Nov 22 11:37:00.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
379Nov 22 11:37:00.000 [info] handle_response_fetch_consensus(): Received consensus directory (body size 2006032) from server '83.212.101.3:80'
380Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'dannenberg' at dannenberg.torauth.de:80 (contact Andreas Lehner; identity 0232AF901C31A04EE9848595AF9BB7620D4C5B2E)
381Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'tor26' at 86.59.21.38:80 (contact Peter Palfrader; identity 14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4)
382Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'longclaw' at 199.58.81.140:80 (contact Riseup Networks <collective at riseup dot net> - 1nNzekuHGGzBYRzyjfjFEfeisNvxkn4RT; identity 23D15D965BC35114467363C165C4F724B64B4F66)
383Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'bastet' at 204.13.164.118:80 (contact stefani <nocat at readthefinemanual dot net>; identity 27102BC123E7AF1D4741AE047E160C91ADC76B21)
384Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'maatuska' at 171.25.193.9:443 (contact 4096R/1E8BF34923291265 Linus Nordberg <linus@nordberg.se>; identity 49015F787433103580E3B66A1707A00E60F2D15B)
385Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'moria1' at 128.31.0.34:9131 (contact 1024D/28988BF5 arma mit edu; identity D586D18309DED4CD6D57C18FDB97EFA96D330566)
386Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'dizum' at 194.109.206.212:80 (contact 1024R/8D56913D Alex de Joode <adejoode@sabotage.org>; identity E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58)
387Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'gabelmoo' at 131.188.40.189:80 (contact 4096R/261C5FBE77285F88FB0C343266C8C2D7C5AA446D Sebastian Hahn <tor@sebastianhahn.net> - 12NbRAjAG5U3LLWETSF7fSTcdaz32Mu5CN; identity ED03BB616EB2F60BEC80151114BB25CEF515B226)
388Nov 22 11:37:00.000 [info] Looks like we need to download a new certificate from authority 'Faravahar' at 154.35.175.225:80 (contact 0x0B47D56D Sina Rabbani (inf0) <sina redteam net>; identity EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97)
389Nov 22 11:37:00.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 0 (). We were unable to check 9 of the signatures, because we were missing the keys.
390Nov 22 11:37:00.000 [info] networkstatus_set_current_consensus(): Not enough certificates to check networkstatus consensus
391Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority moria1 (ID digest D586D18309DED4CD6D57C18FDB97EFA96D330566); launching request.
392Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority tor26 (ID digest 14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4); launching request.
393Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority dizum (ID digest E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58); launching request.
394Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority gabelmoo (ID digest ED03BB616EB2F60BEC80151114BB25CEF515B226); launching request.
395Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority dannenberg (ID digest 0232AF901C31A04EE9848595AF9BB7620D4C5B2E); launching request.
396Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority maatuska (ID digest 49015F787433103580E3B66A1707A00E60F2D15B); launching request.
397Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority Faravahar (ID digest EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97); launching request.
398Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority longclaw (ID digest 23D15D965BC35114467363C165C4F724B64B4F66); launching request.
399Nov 22 11:37:00.000 [info] authority_certs_fetch_missing(): No current certificate known for authority bastet (ID digest 27102BC123E7AF1D4741AE047E160C91ADC76B21); launching request.
400Nov 22 11:37:00.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
401Nov 22 11:37:00.000 [info] connection_ap_make_link(): ... application connection created and linked.
402Nov 22 11:37:00.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
403Nov 22 11:37:00.000 [notice] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
404Nov 22 11:37:00.000 [info] handle_response_fetch_consensus(): Successfully loaded consensus.
405Nov 22 11:37:00.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
406Nov 22 11:37:00.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
407Nov 22 11:37:00.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
408Nov 22 11:37:00.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16366.
409Nov 22 11:37:00.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
410Nov 22 11:37:00.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=480
411Nov 22 11:37:00.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=480
412Nov 22 11:37:00.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16366 after 0 seconds.
413Nov 22 11:37:00.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
414Nov 22 11:37:00.000 [notice] Bootstrapped 40%: Loading authority key certs
415Nov 22 11:37:00.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16366. Removing stream.
416Nov 22 11:37:00.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
417Nov 22 11:37:00.000 [info] handle_response_fetch_certificate(): Received authority certificates (body size 20442) from server '83.212.101.3:80'
418Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority dannenberg with signing key 4F82D69064739702C50C69436997FCB9C29944ED
419Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority tor26 with signing key 6AEC757516B142855BCE29708EBDA965AC3DD06A
420Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
421Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1
422Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority maatuska with signing key C9C96501FD35732C45C424B74CC32739991B1F51
423Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
424Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A
425Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority gabelmoo with signing key 28EB6C6635F1DB90BB60AF8B43F1676E892BB30B
426Nov 22 11:37:00.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority Faravahar with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC
427Nov 22 11:37:00.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
428Nov 22 11:37:01.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
429Nov 22 11:37:01.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
430Nov 22 11:37:01.000 [info] Choosing expected valid-after time as 2017-11-22 11:00:00: consensus_set=1, interval=3600
431Nov 22 11:37:01.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live microdesc consensus was the most recent until 2017-11-22 11:00:00 and will expire at 2017-11-22 13:00:00; fetching the next one at 2017-11-22 12:56:37.
432Nov 22 11:37:01.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
433Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
434Nov 22 11:37:01.000 [notice] Bootstrapped 45%: Asking for relay descriptors
435Nov 22 11:37:01.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6562, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.)
436Nov 22 11:37:01.000 [info] launch_descriptor_downloads(): Launching 14 requests for 6562 microdescs, 500 at a time
437Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
438Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
439Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
440Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
441Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
442Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) for circuit.
443Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
444Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
445Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
446Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
447Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
448Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
449Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
450Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
451Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
452Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
453Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
454Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
455Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
456Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
457Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
458Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
459Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
460Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
461Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
462Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
463Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
464Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
465Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
466Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
467Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
468Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
469Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
470Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
471Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
472Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
473Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
474Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
475Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
476Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
477Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
478Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
479Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
480Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
481Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
482Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit.
483Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
484Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
485Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
486Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
487Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
488Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
489Nov 22 11:37:01.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
490Nov 22 11:37:01.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
491Nov 22 11:37:01.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
492Nov 22 11:37:01.000 [info] connection_ap_make_link(): ... application connection created and linked.
493Nov 22 11:37:01.000 [info] handle_response_fetch_certificate(): Successfully loaded certificates from fetch.
494Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
495Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
496Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
497Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16367.
498Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
499Nov 22 11:37:01.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
500Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
501Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2359287131 to begin stream 45294.
502Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2359287131
503Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
504Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
505Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27021.
506Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
507Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
508Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
509Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16368.
510Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
511Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
512Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
513Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27022.
514Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
515Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
516Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
517Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27023.
518Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
519Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
520Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
521Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27024.
522Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
523Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
524Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
525Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16369.
526Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
527Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
528Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
529Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16370.
530Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
531Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
532Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
533Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16371.
534Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
535Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
536Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
537Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16372.
538Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
539Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
540Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
541Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 2983112736 to begin stream 16373.
542Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 2983112736
543Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
544Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
545Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27025.
546Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
547Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
548Nov 22 11:37:01.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
549Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27026.
550Nov 22 11:37:01.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
551Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=2850
552Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=360
553Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
554Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
555Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
556Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
557Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
558Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
559Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
560Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
561Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
562Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
563Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
564Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
565Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
566Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
567Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
568Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
569Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
570Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
571Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
572Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
573Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
574Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
575Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
576Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
577Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
578Nov 22 11:37:01.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
579Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27021 after 0 seconds.
580Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
581Nov 22 11:37:01.000 [notice] Bootstrapped 50%: Loading relay descriptors
582Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27022 after 0 seconds.
583Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
584Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27023 after 0 seconds.
585Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
586Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27024 after 0 seconds.
587Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
588Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27025 after 0 seconds.
589Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
590Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27026 after 0 seconds.
591Nov 22 11:37:01.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
592Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2359287131 streamid 45294 after 0 seconds.
593Nov 22 11:37:01.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
594Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27026. Removing stream.
595Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
596Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
597Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 43704) from server '109.105.109.163:38980'
598Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
599Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 62/6562, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.)
600Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
601Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16367 after 0 seconds.
602Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
603Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16368 after 0 seconds.
604Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
605Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16369 after 0 seconds.
606Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
607Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16370 after 0 seconds.
608Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
609Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16371 after 0 seconds.
610Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
611Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16372 after 0 seconds.
612Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
613Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2983112736 streamid 16373 after 0 seconds.
614Nov 22 11:37:01.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
615Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27021. Removing stream.
616Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
617Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
618Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 249985) from server '109.105.109.163:38980'
619Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
620Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 562/6562, and can only build 0% of likely paths. (We have 8% of guards bw, 7% of midpoint bw, and 5% of exit bw = 0% of path bw.)
621Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
622Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27022. Removing stream.
623Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
624Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
625Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 261718) from server '109.105.109.163:38980'
626Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
627Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 1062/6562, and can only build 0% of likely paths. (We have 16% of guards bw, 15% of midpoint bw, and 17% of exit bw = 0% of path bw.)
628Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
629Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 45294. Removing stream.
630Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
631Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A)
632Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 267275) from server '109.105.109.163:47779'
633Nov 22 11:37:01.000 [info] microdesc_note_outdated_dirserver(): Noted 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A as outdated md dirserver
634Nov 22 11:37:01.000 [info] dir_microdesc_download_failed(): Failed to download md JLAf3f7dmz/MMzV2GFuvX9nTqzEvzRiCU7jM/+I1bcs from 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A
635Nov 22 11:37:01.000 [info] dir_microdesc_download_failed(): Failed to download md Hnv5STYAI6ubCkLIfNqBFk4Ngs/9oRcbOV89VpixdKo from 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A
636Nov 22 11:37:01.000 [info] dir_microdesc_download_failed(): Failed to download md EzzPNhGnTCGtxtXzuuTnQ1sMQyUpayYHCCPl3kZoWhI from 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A
637Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
638Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 1559/6562, and can only build 1% of likely paths. (We have 24% of guards bw, 23% of midpoint bw, and 25% of exit bw = 1% of path bw.)
639Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
640Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27023. Removing stream.
641Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
642Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
643Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 260548) from server '109.105.109.163:38980'
644Nov 22 11:37:01.000 [info] Bootstrapped 51%: Loading relay descriptors
645Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
646Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2059/6562, and can only build 2% of likely paths. (We have 31% of guards bw, 30% of midpoint bw, and 30% of exit bw = 2% of path bw.)
647Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
648Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27024. Removing stream.
649Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
650Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
651Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 264766) from server '109.105.109.163:38980'
652Nov 22 11:37:01.000 [info] Bootstrapped 52%: Loading relay descriptors
653Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
654Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2559/6562, and can only build 6% of likely paths. (We have 39% of guards bw, 39% of midpoint bw, and 38% of exit bw = 6% of path bw.)
655Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
656Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27025. Removing stream.
657Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
658Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
659Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 283523) from server '109.105.109.163:38980'
660Nov 22 11:37:01.000 [notice] Bootstrapped 55%: Loading relay descriptors
661Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
662Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3059/6562, and can only build 10% of likely paths. (We have 47% of guards bw, 48% of midpoint bw, and 45% of exit bw = 10% of path bw.)
663Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
664Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16367. Removing stream.
665Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
666Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
667Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 251047) from server '83.212.101.3:80'
668Nov 22 11:37:01.000 [info] Bootstrapped 57%: Loading relay descriptors
669Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
670Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3559/6562, and can only build 15% of likely paths. (We have 53% of guards bw, 54% of midpoint bw, and 53% of exit bw = 15% of path bw.)
671Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
672Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16368. Removing stream.
673Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
674Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
675Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 260860) from server '83.212.101.3:80'
676Nov 22 11:37:01.000 [notice] Bootstrapped 60%: Loading relay descriptors
677Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
678Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 4059/6562, and can only build 22% of likely paths. (We have 60% of guards bw, 61% of midpoint bw, and 60% of exit bw = 22% of path bw.)
679Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
680Nov 22 11:37:01.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16369. Removing stream.
681Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
682Nov 22 11:37:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
683Nov 22 11:37:01.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 255258) from server '83.212.101.3:80'
684Nov 22 11:37:01.000 [notice] Bootstrapped 65%: Loading relay descriptors
685Nov 22 11:37:01.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
686Nov 22 11:37:01.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 4559/6562, and can only build 31% of likely paths. (We have 68% of guards bw, 68% of midpoint bw, and 67% of exit bw = 31% of path bw.)
687Nov 22 11:37:01.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
688Nov 22 11:37:02.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16370. Removing stream.
689Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
690Nov 22 11:37:02.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
691Nov 22 11:37:02.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 261645) from server '83.212.101.3:80'
692Nov 22 11:37:02.000 [notice] Bootstrapped 72%: Loading relay descriptors
693Nov 22 11:37:02.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
694Nov 22 11:37:02.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 5059/6562, and can only build 46% of likely paths. (We have 75% of guards bw, 76% of midpoint bw, and 80% of exit bw = 46% of path bw.)
695Nov 22 11:37:02.000 [info] launch_descriptor_downloads(): Launching 1 request for 3 microdescs, 3 at a time
696Nov 22 11:37:02.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
697Nov 22 11:37:02.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) for circuit.
698Nov 22 11:37:02.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
699Nov 22 11:37:02.000 [info] connection_ap_make_link(): ... application connection created and linked.
700Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
701Nov 22 11:37:02.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
702Nov 22 11:37:02.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
703Nov 22 11:37:02.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3848283409 to begin stream 27027.
704Nov 22 11:37:02.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3848283409
705Nov 22 11:37:02.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=254
706Nov 22 11:37:02.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=254
707Nov 22 11:37:02.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16372. Removing stream.
708Nov 22 11:37:02.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16373. Removing stream.
709Nov 22 11:37:02.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 16371. Removing stream.
710Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
711Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
712Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
713Nov 22 11:37:02.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
714Nov 22 11:37:02.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 263817) from server '83.212.101.3:80'
715Nov 22 11:37:02.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
716Nov 22 11:37:02.000 [notice] Bootstrapped 80%: Connecting to the Tor network
717Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
718Nov 22 11:37:02.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
719Nov 22 11:37:02.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 257515) from server '83.212.101.3:80'
720Nov 22 11:37:02.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
721Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
722Nov 22 11:37:02.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
723Nov 22 11:37:02.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 256121) from server '83.212.101.3:80'
724Nov 22 11:37:02.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
725Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
726Nov 22 11:37:02.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3848283409 streamid 27027 after 0 seconds.
727Nov 22 11:37:02.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
728Nov 22 11:37:02.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 27027. Removing stream.
729Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
730Nov 22 11:37:02.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED)
731Nov 22 11:37:02.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 1284) from server '109.105.109.163:38980'
732Nov 22 11:37:02.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
733Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
734Nov 22 11:37:02.000 [info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
735Nov 22 11:37:02.000 [info] choose_good_exit_server_general(): Found 806 servers that might support 0/0 pending connections.
736Nov 22 11:37:02.000 [info] choose_good_exit_server_general(): Chose exit server '$C10693645ED8EB860EDFCEF82ACC4FAEF7559969~Pasithea at 147.135.156.122'
737Nov 22 11:37:02.000 [info] extend_info_from_node(): Including Ed25519 ID for $C10693645ED8EB860EDFCEF82ACC4FAEF7559969~Pasithea at 147.135.156.122
738Nov 22 11:37:02.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) for circuit.
739Nov 22 11:37:02.000 [info] extend_info_from_node(): Including Ed25519 ID for $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~ndnop2 at 109.105.109.163
740Nov 22 11:37:02.000 [info] extend_info_from_node(): Including Ed25519 ID for $C818C0EA0BAD90F5432DBA4EE662BCBEC39D2668~DunphysTorRelay at 62.210.213.17
741Nov 22 11:37:02.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
742Nov 22 11:37:02.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 226.
743Nov 22 11:37:02.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c2493c0580 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk.
744Nov 22 11:37:02.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
745Nov 22 11:37:02.000 [info] connection_or_set_canonical(): Channel 5 chose an idle timeout of 258.
746Nov 22 11:37:02.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
747Nov 22 11:37:02.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
748Nov 22 11:37:02.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:47779 successful
749Nov 22 11:37:02.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:47779; Waiting for CERTS cell
750Nov 22 11:37:02.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x55c2493c0580 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A, MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk
751Nov 22 11:37:02.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:47779: Authenticated it with RSA and Ed25519
752Nov 22 11:37:02.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
753Nov 22 11:37:02.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE cell to '$4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~ndnop2 at 109.105.109.163'
754Nov 22 11:37:02.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:47779; OR connection is now open, using protocol version 5. Its ID digest is 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A. Our address is apparently 151.177.15.217.
755Nov 22 11:37:02.000 [info] circuit_finish_handshake(): Finished building circuit hop:
756Nov 22 11:37:02.000 [info] exit circ (length 3, last hop Pasithea): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) $C818C0EA0BAD90F5432DBA4EE662BCBEC39D2668(closed) $C10693645ED8EB860EDFCEF82ACC4FAEF7559969(closed)
757Nov 22 11:37:02.000 [info] circuit_send_intermediate_onion_skin(): Sending extend relay cell.
758Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
759Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
760Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
761Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
762Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
763Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
764Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
765Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
766Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
767Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
768Nov 22 11:37:02.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
769Nov 22 11:37:02.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:9150
770Nov 22 11:37:02.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
771Nov 22 11:37:02.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
772Nov 22 11:37:02.000 [notice] Closing old Socks listener on 127.0.0.1:9150
773Nov 22 11:37:02.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
774Nov 22 11:37:02.000 [info] tor_process_handle_destroy(): Terminated process with PID '24169'.
775Nov 22 11:37:02.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
776Nov 22 11:37:02.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
777Nov 22 11:37:02.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 5) marked for close at ../src/or/circuitlist.c:1473 (orig reason: 520, new reason: 0)
778Nov 22 11:37:02.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9)
779Nov 22 11:37:02.000 [info] connection_dir_request_failed(): Giving up on serverdesc/extrainfo fetch from directory server at '169.229.59.75'; retrying
780Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf.
781Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [waiting for circuit] with 129 bytes on inbuf, 0 on outbuf.
782Nov 22 11:37:02.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9)
783Nov 22 11:37:02.000 [info] connection_dir_request_failed(): Giving up on serverdesc/extrainfo fetch from directory server at '169.229.59.74'; retrying
784Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf.
785Nov 22 11:37:02.000 [info] connection_free_(): Freeing linked Socks connection [waiting for circuit] with 129 bytes on inbuf, 0 on outbuf.
786Nov 22 11:37:02.000 [info] circuit_n_chan_done(): Channel failed; closing circ.
787Nov 22 11:37:02.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 3) marked for close at ../src/or/circuitbuild.c:662 (orig reason: 8, new reason: 0)
788Nov 22 11:37:02.000 [info] connection_or_note_state_when_broken(): Connection died in state 'handshaking (proxy) with SSL state (No SSL object)'
789Nov 22 11:37:02.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 4) marked for close at ../src/or/circuitlist.c:1473 (orig reason: 520, new reason: 0)
790Nov 22 11:37:02.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 1) marked for close at ../src/or/circuitlist.c:1473 (orig reason: 520, new reason: 0)
791Nov 22 11:37:02.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 2) marked for close at ../src/or/circuitlist.c:1473 (orig reason: 520, new reason: 0)
792Nov 22 11:37:02.000 [info] notify_waitpid_callback_by_pid(): Child process 24169 has exited; no callback was registered
793Nov 22 11:37:03.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
794Nov 22 11:37:03.000 [notice] Delaying directory fetches: DisableNetwork is set.
795Nov 22 11:37:03.000 [info] circuit_free(): Circuit 0 (id: 5) has been freed.
796Nov 22 11:37:03.000 [info] circuit_build_failed(): Our circuit 0 (id: 3) died before the first hop with no connection
797Nov 22 11:37:03.000 [info] circuit_free(): Circuit 0 (id: 3) has been freed.
798Nov 22 11:37:03.000 [info] circuit_free(): Circuit 0 (id: 4) has been freed.
799Nov 22 11:37:03.000 [info] circuit_free(): Circuit 0 (id: 1) has been freed.
800Nov 22 11:37:03.000 [info] circuit_free(): Circuit 0 (id: 2) has been freed.
801Nov 22 11:37:04.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
802Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
803Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
804Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
805Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
806Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
807Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
808Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
809Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
810Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
811Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
812Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
813Nov 22 11:37:05.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
814Nov 22 11:37:05.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
815Nov 22 11:37:05.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
816Nov 22 11:37:05.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
817Nov 22 11:37:05.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
818Nov 22 11:37:05.000 [info] options_act(): Changed to using entry guards or bridges, or changed preferred or excluded node lists. Abandoning previous circuits.
819Nov 22 11:37:05.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
820Nov 22 11:37:05.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) is now unlisted.
821Nov 22 11:37:05.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) is now unlisted.
822Nov 22 11:37:05.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) is now unlisted.
823Nov 22 11:37:05.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) is now unlisted.
824Nov 22 11:37:05.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) is now unlisted.
825Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
826Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
827Nov 22 11:37:05.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 26 eligible guards to extend it with.
828Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 20 guards to consider.)
829Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($A832D176ECD5C7C6B58825AE22FC4C90FA249637).)
830Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set.
831Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 19 guards to consider.)
832Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($D9A82D2F9C2F65A18407B1D2B764F130847F8B5D).)
833Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set.
834Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 18 guards to consider.)
835Nov 22 11:37:05.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($CDF2E852BF539B82BD10E27E9115A31734E378C2).)
836Nov 22 11:37:05.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
837Nov 22 11:37:05.000 [info] entry_guards_update_primary():   1/3: [bridge] ($A832D176ECD5C7C6B58825AE22FC4C90FA249637)
838Nov 22 11:37:05.000 [info] entry_guards_update_primary():   2/3: [bridge] ($D9A82D2F9C2F65A18407B1D2B764F130847F8B5D)
839Nov 22 11:37:05.000 [info] entry_guards_update_primary():   3/3: [bridge] ($CDF2E852BF539B82BD10E27E9115A31734E378C2)
840Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
841Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
842Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
843Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
844Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
845Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
846Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
847Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
848Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
849Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
850Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
851Nov 22 11:37:05.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
852Nov 22 11:37:05.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
853Nov 22 11:37:05.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
854Nov 22 11:37:05.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
855Nov 22 11:37:05.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
856Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
857Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
858Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
859Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
860Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
861Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
862Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
863Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
864Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
865Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
866Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
867Nov 22 11:37:05.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
868Nov 22 11:37:05.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
869Nov 22 11:37:05.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
870Nov 22 11:37:05.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
871Nov 22 11:37:05.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
872Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
873Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
874Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
875Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
876Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
877Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
878Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
879Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
880Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
881Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
882Nov 22 11:37:05.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
883Nov 22 11:37:05.000 [notice] Opening Socks listener on 127.0.0.1:9150
884Nov 22 11:37:05.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
885Nov 22 11:37:05.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
886Nov 22 11:37:05.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec ./TorBrowser/Tor/PluggableTransports/fteproxy.bin --managed) does not provide any needed transports and will not be launched.
887Nov 22 11:37:05.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec ./TorBrowser/Tor/PluggableTransports/meek-client-torbrowser -- ./TorBrowser/Tor/PluggableTransports/meek-client) does not provide any needed transports and will not be launched.
888Nov 22 11:37:05.000 [info] parse_transport_line(): Pluggable transport proxy (snowflake exec ./TorBrowser/Tor/PluggableTransports/snowflake-client -url https://snowflake-reg.appspot.com/ -front www.google.com -ice stun:stun.l.google.com:19302) does not provide any needed transports and will not be launched.
889Nov 22 11:37:05.000 [info] launch_managed_proxy(): Managed proxy at './TorBrowser/Tor/PluggableTransports/obfs4proxy' has spawned with PID '24177'.
890Nov 22 11:37:05.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
891Nov 22 11:37:05.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
892Nov 22 11:37:05.000 [info] should_delay_dir_fetches(): Delaying dir fetches (pt proxies still configuring)
893Nov 22 11:37:05.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (VERSION 1)
894Nov 22 11:37:05.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs2 socks5 127.0.0.1:46579)
895Nov 22 11:37:05.000 [info] parse_cmethod_line(): Transport obfs2 at 127.0.0.1:46579 with SOCKS 3. Attached to managed proxy.
896Nov 22 11:37:05.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs3 socks5 127.0.0.1:41769)
897Nov 22 11:37:05.000 [info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:41769 with SOCKS 3. Attached to managed proxy.
898Nov 22 11:37:05.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs4 socks5 127.0.0.1:35093)
899Nov 22 11:37:05.000 [info] parse_cmethod_line(): Transport obfs4 at 127.0.0.1:35093 with SOCKS 3. Attached to managed proxy.
900Nov 22 11:37:05.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD scramblesuit socks5 127.0.0.1:41463)
901Nov 22 11:37:05.000 [info] parse_cmethod_line(): Transport scramblesuit at 127.0.0.1:41463 with SOCKS 3. Attached to managed proxy.
902Nov 22 11:37:05.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHODS DONE)
903Nov 22 11:37:05.000 [info] handle_methods_done(): Client managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy' configuration completed!
904Nov 22 11:37:05.000 [info] register_client_proxy(): Successfully registered transport obfs2
905Nov 22 11:37:05.000 [info] register_client_proxy(): Successfully registered transport obfs3
906Nov 22 11:37:05.000 [info] register_client_proxy(): Successfully registered transport obfs4
907Nov 22 11:37:05.000 [info] register_client_proxy(): Successfully registered transport scramblesuit
908Nov 22 11:37:06.000 [info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
909Nov 22 11:37:06.000 [info] choose_good_exit_server_general(): Found 806 servers that might support 0/0 pending connections.
910Nov 22 11:37:06.000 [info] choose_good_exit_server_general(): Chose exit server '$3E50CBCA98A20F637BC4551FD4F132D062DB9A51~RSF12thMarch at 192.36.27.7'
911Nov 22 11:37:06.000 [info] extend_info_from_node(): Including Ed25519 ID for $3E50CBCA98A20F637BC4551FD4F132D062DB9A51~RSF12thMarch at 192.36.27.7
912Nov 22 11:37:06.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set.
913Nov 22 11:37:06.000 [info] sample_reachable_filtered_entry_guards():   (After filters [17], we have 1 guards to consider.)
914Nov 22 11:37:06.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239).)
915Nov 22 11:37:06.000 [info] select_entry_guard_for_circuit(): No primary or confirmed guards available. Selected random guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) for circuit. Will try other guards before using this circuit.
916Nov 22 11:37:06.000 [info] extend_info_from_node(): Including Ed25519 ID for $A09D536DD1752D542E1FBB3C9CE4449D51298239~LeifEricson at 83.212.101.3
917Nov 22 11:37:06.000 [info] extend_info_from_node(): Not including the ed25519 ID for $B71B943983906009E28FAF737B33356F78338082~onionfoo at 134.19.64.88, since it won't be able to authenticate it.
918Nov 22 11:37:06.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
919Nov 22 11:37:06.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 267.
920Nov 22 11:37:06.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x55c248503c00 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w.
921Nov 22 11:37:06.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
922Nov 22 11:37:06.000 [info] connection_or_set_canonical(): Channel 6 chose an idle timeout of 202.
923Nov 22 11:37:06.000 [info] TLS error while handshaking with [scrubbed]: wrong version number (in SSL routines:ssl3_get_record:SSLv3/TLS write client hello)
924Nov 22 11:37:06.000 [info] connection_tls_continue_handshake(): tls error [misc error]. breaking connection.
925Nov 22 11:37:06.000 [info] circuit_n_chan_done(): Channel failed; closing circ.
926Nov 22 11:37:06.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 6) marked for close at ../src/or/circuitbuild.c:662 (orig reason: 8, new reason: 0)
927Nov 22 11:37:06.000 [info] connection_or_note_state_when_broken(): Connection died in state 'handshaking (TLS) with SSL state SSLv3/TLS write client hello in HANDSHAKE'
928Nov 22 11:37:06.000 [warn] Problem bootstrapping. Stuck at 90%: Establishing a Tor circuit. (DONE; DONE; count 1; recommendation warn; host A09D536DD1752D542E1FBB3C9CE4449D51298239 at 83.212.101.3:80)
929Nov 22 11:37:06.000 [warn] 2 connections have failed:
930Nov 22 11:37:06.000 [warn]  1 connections died in state handshaking (TLS) with SSL state SSLv3/TLS write client hello in HANDSHAKE
931Nov 22 11:37:06.000 [warn]  1 connections died in state handshaking (proxy) with SSL state (No SSL object)
932Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
933Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
934Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
935Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
936Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
937Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
938Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
939Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
940Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
941Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
942Nov 22 11:37:06.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
943Nov 22 11:37:06.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:9150
944Nov 22 11:37:06.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
945Nov 22 11:37:06.000 [notice] Tor 0.3.2.4-alpha-dev (git-d7833c9d27feed9e) opening log file.
946Nov 22 11:37:06.000 [notice] Closing old Socks listener on 127.0.0.1:9150
947Nov 22 11:37:06.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
948Nov 22 11:37:06.000 [info] tor_process_handle_destroy(): Terminated process with PID '24177'.
949Nov 22 11:37:06.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
950Nov 22 11:37:06.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
951Nov 22 11:37:06.000 [info] notify_waitpid_callback_by_pid(): Child process 24177 has exited; no callback was registered
952Nov 22 11:37:07.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
953Nov 22 11:37:07.000 [notice] Delaying directory fetches: DisableNetwork is set.
954Nov 22 11:37:07.000 [info] circuit_build_failed(): Our circuit 0 (id: 6) died before the first hop with no connection
955Nov 22 11:37:07.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239)
956Nov 22 11:37:07.000 [info] circuit_free(): Circuit 0 (id: 6) has been freed.
957Nov 22 11:37:08.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
958Nov 22 11:37:09.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
959Nov 22 11:37:09.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
960Nov 22 11:37:10.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
961Nov 22 11:37:10.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
962Nov 22 11:37:11.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
963Nov 22 11:37:11.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
964Nov 22 11:37:12.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
965Nov 22 11:37:12.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
966Nov 22 11:37:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
967Nov 22 11:37:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
968Nov 22 11:37:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
969Nov 22 11:37:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
970Nov 22 11:37:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
971Nov 22 11:37:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
972Nov 22 11:37:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
973Nov 22 11:37:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
974Nov 22 11:37:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
975Nov 22 11:37:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
976Nov 22 11:37:17.000 [info] connection_control_reached_eof(): Control connection reached EOF. Closing.
977Nov 22 11:37:17.000 [notice] Owning controller connection has closed -- exiting now.
978Nov 22 11:37:17.000 [notice] Catching signal TERM, exiting cleanly.
979Nov 22 11:37:17.000 [info] or_state_save(): Saved state to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/state"
980Nov 22 11:37:18.000 [info] tor_lockfile_unlock(): Unlocking "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/lock"