Ticket #28717: log_of_the_bridge.txt

File log_of_the_bridge.txt, 3.4 KB (added by loskiq, 18 months ago)

log of the bridge

1Dec 04 08:11:53.000 [notice] Tor (git-4ac3ccf2863b86e7) opening log file.
2Dec 04 08:11:53.847 [notice] Tor (git-4ac3ccf2863b86e7) running on Linux with Libevent 2.1.8-stable, OpenSSL LibreSSL 2.8.2, Zlib 1.2.8, Liblzma N/A, and Libzstd N/A.
3Dec 04 08:11:53.847 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
4Dec 04 08:11:53.860 [notice] Read configuration file "/etc/tor/torrc".
5Dec 04 08:11:53.874 [notice] Based on detected system memory, MaxMemInQueues is set to 745 MB. You can override this by setting MaxMemInQueues by hand.
6Dec 04 08:11:53.885 [notice] Scheduler type KIST has been enabled.
7Dec 04 08:11:53.885 [notice] Opening Socks listener on
8Dec 04 08:11:53.885 [notice] Opening OR listener on
9Dec 04 08:11:53.885 [notice] Opening Extended OR listener on
10Dec 04 08:11:53.885 [notice] Extended OR listener listening on port 43165.
11Dec 04 08:11:53.000 [notice] Parsing GEOIP IPv4 file /usr/local/share/tor/geoip.
12Dec 04 08:11:54.000 [notice] Parsing GEOIP IPv6 file /usr/local/share/tor/geoip6.
13Dec 04 08:11:54.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
14Dec 04 08:11:54.000 [notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster.
15Dec 04 08:11:55.000 [notice] Your Tor server's identity key fingerprint is 'huy 3E0CFCEE7183970DCC70ABC2D10518BC288BF0DE'
16Dec 04 08:11:55.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'huy 7A715B42FD5D8775C208E75B20255CE571E2C023'
17Dec 04 08:11:55.000 [notice] Bootstrapped 0%: Starting
18Dec 04 08:12:04.000 [notice] Starting with guard context "default"
19Dec 04 08:12:04.000 [notice] Bootstrapped 80%: Connecting to the Tor network
20Dec 04 08:12:04.000 [notice] Registered server transport 'obfs4' at '[::]:40635'
21Dec 04 08:12:04.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
22Dec 04 08:12:04.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
23Dec 04 08:12:05.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
24Dec 04 08:12:05.000 [notice] Bootstrapped 100%: Done
25Dec 04 09:07:05.000 [notice] Guessed our IP address as (source:
26Dec 04 09:07:05.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
27Dec 04 09:07:06.000 [notice] Performing bandwidth self-test...done.
28Dec 04 14:12:04.000 [notice] Heartbeat: Tor's uptime is 5:04 hours, with 15 circuits open. I've sent 3.84 MB and received 5.77 MB.
29Dec 04 14:12:04.000 [notice] Heartbeat: In the last 6 hours, I have seen 1 unique clients.
30Dec 04 20:12:04.000 [notice] Heartbeat: Tor's uptime is 11:04 hours, with 14 circuits open. I've sent 29.05 MB and received 32.80 MB.
31Dec 04 20:12:04.000 [notice] Heartbeat: In the last 6 hours, I have seen 2 unique clients.
32Dec 04 21:23:10.000 [notice] Performing bandwidth self-test...done.
33Dec 05 02:12:04.000 [notice] Heartbeat: Tor's uptime is 17:04 hours, with 14 circuits open. I've sent 31.44 MB and received 38.42 MB.
34Dec 05 02:12:04.000 [notice] Heartbeat: In the last 6 hours, I have seen 0 unique clients.