Ticket #9229: debug-obfs3.log

File debug-obfs3.log, 38.1 KB (added by phw, 6 years ago)
Line 
1[notice] Tor v0.2.5.0-alpha-dev (git-f631b73cd5d97ff1) running on Linux with Libevent 2.0.19-stable and OpenSSL 1.0.1e.
2[notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
3[notice] This version is not a stable Tor release. Expect more bugs than usual.
4[notice] Read configuration file "[redacted]/torrc.client.obfs3".
5[warn] ControlPort is open, but no authentication method has been configured.  This means that any program on your computer can reconfigure your Tor.  That's bad!  You should upgrade your Tor controller as soon as possible.
6[notice] Opening Socks listener on 127.0.0.1:9158
7[notice] Opening Control listener on 127.0.0.1:9128
8[warn] Your log may contain sensitive information - you're logging above "notice". Please log safely. Don't log unless it serves an important reason. Overwrite the log afterwards.
9[debug] tor_disable_debugger_attach(): Attemping to disable debugger attachment to Tor for unprivileged users.
10[debug] tor_disable_debugger_attach(): Debugger attachment disabled for unprivileged users.
11[info] tor_lockfile_lock(): Locking "/tmp/tmptor/lock"
12[debug] parse_dir_authority_line(): Trusted 100 dirserver at 128.31.0.39:9131 (9695)
13[debug] parse_dir_authority_line(): Trusted 111 dirserver at 86.59.21.38:80 (847B)
14[debug] parse_dir_authority_line(): Trusted 102 dirserver at 194.109.206.212:80 (7EA6)
15[debug] parse_dir_authority_line(): Trusted 16 dirserver at 82.94.251.203:80 (4A0C)
16[debug] parse_dir_authority_line(): Trusted 100 dirserver at 76.73.17.194:9030 (F397)
17[debug] parse_dir_authority_line(): Trusted 100 dirserver at 212.112.245.170:80 (F204)
18[debug] parse_dir_authority_line(): Trusted 100 dirserver at 193.23.244.244:80 (7BE6)
19[debug] parse_dir_authority_line(): Trusted 100 dirserver at 208.83.223.34:443 (0AD3)
20[debug] parse_dir_authority_line(): Trusted 100 dirserver at 171.25.193.9:443 (BD6A)
21[debug] parse_dir_authority_line(): Trusted 100 dirserver at 154.35.32.5:80 (CF6D)
22[debug] bridge_add_from_config(): Registering bridge at 83.212.101.2:42782 (transport: obfs3) (no key listed)
23[info] entry_guards_parse_state(): Read 1.000000/2.000000 path bias for node bzoum
24[info] or_state_load(): Loaded state from "/tmp/tmptor/state"
25[info] entry_guards_parse_state(): Read 1.000000/2.000000 path bias for node bzoum
26[debug] circuit_build_times_disabled(): CircuitBuildTime learning is disabled. Consensus=0, Config=1, AuthDir=0, StateFile=0
27[debug] circuit_build_times_disabled(): CircuitBuildTime learning is disabled. Consensus=0, Config=1, AuthDir=0, StateFile=0
28[info] read_file_to_str(): Could not open "/tmp/tmptor/router-stability": No such file or directory
29[info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
30[info] geoip_load_file(): Failed to open GEOIP file /usr/local/share/tor/geoip. 
31[info] geoip_load_file(): Failed to open GEOIP file /tmp/tmptor/geoip6. 
32[info] crypto_global_init(): OpenSSL version matches version from headers (1000105f: OpenSSL 1.0.1e 11 Feb 2013).
33[info] crypto_global_init(): NOT using OpenSSL engine support.
34[info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
35[info] crypto_strongest_rand(): Reading entropy from "/dev/urandom"
36[info] tor_tls_init(): OpenSSL OpenSSL 1.0.1e 11 Feb 2013 looks like version 0.9.8m or later; I will try SSL_OP to enable renegotiation
37[notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster.
38[debug] mp_pool_new(): Capacity is 244, item size is 536, alloc size is 130784
39[info] Bootstrapped 0%: Starting.
40[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for gabelmoo
41[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority gabelmoo with signing key 71FE024FCADF0253D842A6DFF6D46FDDE7913467
42[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for dizum
43[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dizum with signing key 9732F95C0620648332899FD91C6463F827983B17
44[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for urras
45[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority urras with signing key EF99F37E2C81A93DE1A96A00B092F196CCA8AFCC
46[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for dannenberg
47[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dannenberg with signing key 02FDDD2FF9E5713AB7A02344444C1F1D1D550859
48[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for tor26
49[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority tor26 with signing key 98CC82342DE8D298CF99D3F1A396475901E0D38E
50[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for maatuska
51[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority maatuska with signing key 11C31A9FF3AF9D5E3712BCC65D3FC15A875AA033
52[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for Faravahar
53[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority Faravahar with signing key 968C87DF711F623351B8639D2593138B62405F1B
54[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for turtles
55[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority turtles with signing key A42032FDB877FB06C4B5AE5AC0D6C073734A92C4
56[debug] trusted_dirs_load_certs_from_string(): Parsed certificate for moria1
57[info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority moria1 with signing key 51AD89034DBAFC005A341DA5C0F6CEDEE3F66E13
58[info] read_file_to_str(): Could not open "/tmp/tmptor/cached-consensus": No such file or directory
59[info] read_file_to_str(): Could not open "/tmp/tmptor/unverified-consensus": No such file or directory
60[info] read_file_to_str(): Could not open "/tmp/tmptor/unverified-microdesc-consensus": No such file or directory
61[info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 4001 descriptors.
62[info] tor_mmap_file(): File "/tmp/tmptor/cached-descriptors" is empty. Ignoring.
63[debug] router_parse_list_from_string(): Read router '$2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D~bzoum at 83.212.101.2', purpose 'bridge'
64[info] router_load_routers_from_string(): 1 elements to add
65[info] router_add_to_routerlist(): Dropping bridge descriptor for [scrubbed] because we have no bridge configured at that address.
66[info] router_rebuild_store(): Rebuilding router descriptors cache
67[info] tor_mmap_file(): File "/tmp/tmptor/cached-descriptors" is empty. Ignoring.
68[info] router_rebuild_store(): Reconstructing pointers into cache
69[info] tor_mmap_file(): Could not open "/tmp/tmptor/cached-extrainfo" for mmap(): No such file or directory
70[info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
71[info] compute_weighted_bandwidths(): Empty routerlist passed in to consensus weight node selection for rule weight as guard
72[info] smartlist_choose_node_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard
73[info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known)
74[info] compute_weighted_bandwidths(): Empty routerlist passed in to consensus weight node selection for rule weight as guard
75[info] smartlist_choose_node_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard
76[info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known)
77[info] compute_weighted_bandwidths(): Empty routerlist passed in to consensus weight node selection for rule weight as guard
78[info] smartlist_choose_node_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard
79[info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known)
80[info] compute_weighted_bandwidths(): Empty routerlist passed in to consensus weight node selection for rule weight as guard
81[info] smartlist_choose_node_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard
82[info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known)
83[info] compute_weighted_bandwidths(): Empty routerlist passed in to consensus weight node selection for rule weight as guard
84[info] smartlist_choose_node_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard
85[info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known)
86[info] or_state_save(): Saved state to "/tmp/tmptor/state"
87[debug] pt_configure_remaining_proxies(): Configuring remaining managed proxies (1)!
88[info] launch_managed_proxy(): Managed proxy at '[redacted]/obfsproxy/bin/obfsproxy' has spawned with PID '15732'.
89[debug] pt_configure_remaining_proxies(): Configuring remaining managed proxies (1)!
90[info] handle_proxy_line(): Got a line from managed proxy '[redacted]/obfsproxy/bin/obfsproxy': (VERSION 1)
91[info] handle_proxy_line(): Got a line from managed proxy '[redacted]/obfsproxy/bin/obfsproxy': (CMETHOD obfs3 socks4 127.0.0.1:37627)
92[info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:37627 with SOCKS 2. Attached to managed proxy.
93[info] handle_proxy_line(): Got a line from managed proxy '[redacted]/obfsproxy/bin/obfsproxy': (CMETHODS DONE)
94[info] handle_methods_done(): Client managed proxy '[redacted]/obfsproxy/bin/obfsproxy' configuration completed!
95[info] register_client_proxy(): Successfully registered transport obfs3
96[debug] fetch_bridge_descriptors(): ask_bridge_directly=1 (1, 1, 0)
97[debug] directory_initiate_command_rend(): anonymized 0, use_begindir 1.
98[debug] directory_initiate_command_rend(): Initiating server descriptor fetch
99[info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:42782 ...
100[debug] connection_add_impl(): new conn type Socks, socket -1, address (Tor_internal), n_conns 3.
101[debug] circuit_get_open_circ_or_launch(): considering 1, $0000000000000000000000000000000000000000
102[debug] onion_pick_cpath_exit(): Launching a one-hop circuit for dir tunnel.
103[info] onion_pick_cpath_exit(): Using requested exit node '$0000000000000000000000000000000000000000~0000000000000000000 at 83.212.101.2'
104[debug] onion_extend_cpath(): Path is 0 long; we want 1
105[debug] onion_extend_cpath(): Chose router $0000000000000000000000000000000000000000~0000000000000000000 at 83.212.101.2 for hop 1 (exit is 0000000000000000000000000000000000000000)
106[debug] onion_extend_cpath(): Path is complete: 1 steps long
107[debug] circuit_handle_first_hop(): Looking for firsthop '83.212.101.2:42782'
108[info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
109[notice] Bootstrapped 5%: Connecting to directory server.
110[debug] channel_tls_connect(): In channel_tls_connect() for channel 0x7f6435514e60 (global id 0)
111[debug] connection_connect(): Connecting to [scrubbed]:37627.
112[debug] connection_connect(): Connection to [scrubbed]:37627 in progress (sock 10).
113[debug] connection_add_impl(): new conn type OR, socket 10, address 83.212.101.2, n_conns 4.
114[debug] channel_tls_connect(): Got orconn 0x7f6435514fc0 for channel with global id 0
115[debug] channel_register(): Registering channel 0x7f6435514e60 (ID 0) in state opening (1) with digest 0000000000000000000000000000000000000000
116[info] channel_register(): Channel 0x7f6435514e60 (global ID 0) in state opening (1) registered with no identity digest
117[debug] channel_set_cell_handlers(): Setting cell_handler callback for channel 0x7f6435514e60 to 0x7f6433656010
118[debug] channel_set_cell_handlers(): Setting var_cell_handler callback for channel 0x7f6435514e60 to 0x7f64336553a0
119[debug] circuit_handle_first_hop(): connecting in progress (or finished). Good.
120[info] connection_ap_make_link(): ... application connection created and linked.
121[debug] connection_add_impl(): new conn type Directory, socket -1, address 83.212.101.2, n_conns 5.
122[debug] conn_write_callback(): socket 10 wants to write.
123[debug] connection_or_finished_connecting(): OR connect() to router at 83.212.101.2:42782 finished.
124[notice] Bootstrapped 10%: Finishing handshake with directory server.
125[debug] connection_proxy_connect(): set state PROXY_SOCKS4_WANT_CONNECT_OK
126[debug] conn_read_callback(): socket -1 wants to read.
127[info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
128[info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
129[debug] connection_dir_finished_flushing(): client finished sending command.
130[debug] connection_bucket_refill_helper(): global_write_bucket now 1073741824.
131[debug] connection_bucket_refill_helper(): global_relayed_write_bucket now 1073741824.
132[debug] conn_read_callback(): socket 10 wants to read.
133[debug] read_to_chunk(): Read 8 bytes. 8 on inbuf.
134[debug] connection_read_proxy_handshake(): enter state PROXY_SOCKS4_WANT_CONNECT_OK
135[debug] connection_read_proxy_handshake(): leaving state PROXY_CONNECTED
136[info] connection_read_proxy_handshake(): Proxy Client: connection to 83.212.101.2:42782 successful
137[debug] rectify_client_ciphers(): List was: ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-CAMELLIA256-SHA:DHE-DSS-CAMELLIA256-SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:ECDH-RSA-AES256-SHA:ECDH-ECDSA-AES256-SHA:CAMELLIA256-SHA:AES256-SHA:ECDHE-ECDSA-RC4-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-RC4-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:ECDH-RSA-RC4-SHA:ECDH-RSA-AES128-SHA:ECDH-ECDSA-RC4-SHA:ECDH-ECDSA-AES128-SHA:SEED-SHA:CAMELLIA128-SHA:RC4-MD5:RC4-SHA:AES128-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:ECDH-RSA-DES-CBC3-SHA:ECDH-ECDSA-DES-CBC3-SHA:DES-CBC3-SHA:!SSLv2
138[debug] rectify_client_ciphers(): Cipher 0: 300c00a ECDHE-ECDSA-AES256-SHA
139[debug] rectify_client_ciphers(): Cipher 1: 300c014 ECDHE-RSA-AES256-SHA
140[debug] rectify_client_ciphers(): Cipher 2: 3000088 DHE-RSA-CAMELLIA256-SHA
141[debug] rectify_client_ciphers(): Cipher 3: 3000087 DHE-DSS-CAMELLIA256-SHA
142[debug] rectify_client_ciphers(): Cipher 4: 3000039 DHE-RSA-AES256-SHA
143[debug] rectify_client_ciphers(): Cipher 5: 3000038 DHE-DSS-AES256-SHA
144[debug] rectify_client_ciphers(): Cipher 6: 300c00f ECDH-RSA-AES256-SHA
145[debug] rectify_client_ciphers(): Cipher 7: 300c005 ECDH-ECDSA-AES256-SHA
146[debug] rectify_client_ciphers(): Cipher 8: 3000084 CAMELLIA256-SHA
147[debug] rectify_client_ciphers(): Cipher 9: 3000035 AES256-SHA
148[debug] rectify_client_ciphers(): Cipher 10: 300c007 ECDHE-ECDSA-RC4-SHA
149[debug] rectify_client_ciphers(): Cipher 11: 300c009 ECDHE-ECDSA-AES128-SHA
150[debug] rectify_client_ciphers(): Cipher 12: 300c011 ECDHE-RSA-RC4-SHA
151[debug] rectify_client_ciphers(): Cipher 13: 300c013 ECDHE-RSA-AES128-SHA
152[debug] rectify_client_ciphers(): Cipher 14: 3000045 DHE-RSA-CAMELLIA128-SHA
153[debug] rectify_client_ciphers(): Cipher 15: 3000044 DHE-DSS-CAMELLIA128-SHA
154[debug] rectify_client_ciphers(): Cipher 16: 3000033 DHE-RSA-AES128-SHA
155[debug] rectify_client_ciphers(): Cipher 17: 3000032 DHE-DSS-AES128-SHA
156[debug] rectify_client_ciphers(): Cipher 18: 300c00c ECDH-RSA-RC4-SHA
157[debug] rectify_client_ciphers(): Cipher 19: 300c00e ECDH-RSA-AES128-SHA
158[debug] rectify_client_ciphers(): Cipher 20: 300c002 ECDH-ECDSA-RC4-SHA
159[debug] rectify_client_ciphers(): Cipher 21: 300c004 ECDH-ECDSA-AES128-SHA
160[debug] rectify_client_ciphers(): Cipher 22: 3000096 SEED-SHA
161[debug] rectify_client_ciphers(): Cipher 23: 3000041 CAMELLIA128-SHA
162[debug] rectify_client_ciphers(): Cipher 24: 3000004 RC4-MD5
163[debug] rectify_client_ciphers(): Cipher 25: 3000005 RC4-SHA
164[debug] rectify_client_ciphers(): Cipher 26: 300002f AES128-SHA
165[debug] rectify_client_ciphers(): Cipher 27: 300c008 ECDHE-ECDSA-DES-CBC3-SHA
166[debug] rectify_client_ciphers(): Cipher 28: 300c012 ECDHE-RSA-DES-CBC3-SHA
167[debug] rectify_client_ciphers(): Cipher 29: 3000016 EDH-RSA-DES-CBC3-SHA
168[debug] rectify_client_ciphers(): Cipher 30: 3000013 EDH-DSS-DES-CBC3-SHA
169[debug] rectify_client_ciphers(): Cipher 31: 300c00d ECDH-RSA-DES-CBC3-SHA
170[debug] rectify_client_ciphers(): Cipher 32: 300c003 ECDH-ECDSA-DES-CBC3-SHA
171[debug] rectify_client_ciphers(): Cipher 33: 300000a DES-CBC3-SHA
172[debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-AES256-SHA
173[debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-AES256-SHA
174[debug] rectify_client_ciphers(): Found cipher DHE-RSA-CAMELLIA256-SHA
175[debug] rectify_client_ciphers(): Found cipher DHE-DSS-CAMELLIA256-SHA
176[debug] rectify_client_ciphers(): Found cipher DHE-RSA-AES256-SHA
177[debug] rectify_client_ciphers(): Found cipher DHE-DSS-AES256-SHA
178[debug] rectify_client_ciphers(): Found cipher ECDH-RSA-AES256-SHA
179[debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-AES256-SHA
180[debug] rectify_client_ciphers(): Found cipher CAMELLIA256-SHA
181[debug] rectify_client_ciphers(): Found cipher AES256-SHA
182[debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-RC4-SHA
183[debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-AES128-SHA
184[debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-RC4-SHA
185[debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-AES128-SHA
186[debug] rectify_client_ciphers(): Found cipher DHE-RSA-CAMELLIA128-SHA
187[debug] rectify_client_ciphers(): Found cipher DHE-DSS-CAMELLIA128-SHA
188[debug] rectify_client_ciphers(): Found cipher DHE-RSA-AES128-SHA
189[debug] rectify_client_ciphers(): Found cipher DHE-DSS-AES128-SHA
190[debug] rectify_client_ciphers(): Found cipher ECDH-RSA-RC4-SHA
191[debug] rectify_client_ciphers(): Found cipher ECDH-RSA-AES128-SHA
192[debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-RC4-SHA
193[debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-AES128-SHA
194[debug] rectify_client_ciphers(): Found cipher SEED-SHA
195[debug] rectify_client_ciphers(): Found cipher CAMELLIA128-SHA
196[debug] rectify_client_ciphers(): Found cipher RC4-MD5
197[debug] rectify_client_ciphers(): Found cipher RC4-SHA
198[debug] rectify_client_ciphers(): Found cipher AES128-SHA
199[debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-DES-CBC3-SHA
200[debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-DES-CBC3-SHA
201[debug] rectify_client_ciphers(): Found cipher EDH-RSA-DES-CBC3-SHA
202[debug] rectify_client_ciphers(): Found cipher EDH-DSS-DES-CBC3-SHA
203[debug] rectify_client_ciphers(): Found cipher ECDH-RSA-DES-CBC3-SHA
204[debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-DES-CBC3-SHA
205[debug] rectify_client_ciphers(): Inserting fake SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA
206[debug] rectify_client_ciphers(): Found cipher DES-CBC3-SHA
207[debug] connection_tls_start_handshake(): starting TLS handshake on fd 10
208[debug] tor_tls_handshake(): About to call SSL_connect on 0x7f6435515b70 (before/accept initialization)
209[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state before/connect initialization [type=16,val=1].
210[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state before/connect initialization [type=4097,val=1].
211[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state unknown state [type=4097,val=1].
212[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state unknown state [type=4098,val=-1].
213[debug] tor_tls_handshake(): After call, 0x7f6435515b70 was in state unknown state
214[debug] connection_tls_continue_handshake(): wanted read
215[debug] connection_bucket_refill_helper(): global_read_bucket now 1073741824.
216[debug] connection_bucket_refill_helper(): global_relayed_read_bucket now 1073741824.
217[debug] conn_read_callback(): socket 10 wants to read.
218[debug] tor_tls_handshake(): About to call SSL_connect on 0x7f6435515b70 (unknown state)
219[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read server hello A [type=4097,val=1].
220[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read server certificate A [type=4097,val=1].
221[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read server key exchange A [type=4097,val=1].
222[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read server done A [type=4097,val=1].
223[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 write client key exchange A [type=4097,val=1].
224[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 write change cipher spec A [type=4097,val=1].
225[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 write finished A [type=4097,val=1].
226[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 flush data [type=4097,val=1].
227[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read finished A [type=4098,val=-1].
228[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read finished A [type=4098,val=-1].
229[debug] tor_tls_handshake(): After call, 0x7f6435515b70 was in state SSLv3 read finished A
230[debug] connection_tls_continue_handshake(): wanted read
231[debug] conn_read_callback(): socket 10 wants to read.
232[debug] tor_tls_handshake(): About to call SSL_connect on 0x7f6435515b70 (SSLv3 read finished A)
233[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSLv3 read finished A [type=4097,val=1].
234[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSL negotiation finished successfully [type=32,val=1].
235[debug] tor_tls_debug_state_callback(): SSL 0x7f64355189a0 is now in state SSL negotiation finished successfully [type=4098,val=1].
236[debug] tor_tls_handshake(): After call, 0x7f6435515b70 was in state SSL negotiation finished successfully
237[debug] tor_tls_finish_handshake(): Server sent back a single certificate; looks like a v2 handshake on 0x7f6435515b70.
238[info] connection_tls_continue_handshake(): Client got a v3 cert!  Moving on to v3 handshake with ciphersuite DHE-RSA-AES256-SHA
239[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 0 (0 pending in tls object).
240[debug] conn_write_callback(): socket 10 wants to write.
241[debug] flush_chunk_tls(): flushed 9 bytes, 0 ready to flush, 0 remain.
242[debug] connection_handle_write_impl(): After TLS write of 9: 988 read, 507 written
243[debug] connection_bucket_refill_helper(): global_read_bucket now 1073741824.
244[debug] connection_bucket_refill_helper(): global_write_bucket now 1073741824.
245[debug] connection_bucket_refill_helper(): global_relayed_read_bucket now 1073741824.
246[debug] connection_bucket_refill_helper(): global_relayed_write_bucket now 1073741824.
247[debug] conn_read_callback(): socket 10 wants to read.
248[debug] connection_read_to_buf(): 10: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384.
249[debug] connection_read_to_buf(): After TLS read of 1414: 1482 read, 0 written
250[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 1414 (0 pending in tls object).
251[info] channel_tls_process_versions_cell(): Negotiated version 3 with [scrubbed]:42782; Waiting for CERTS cell
252[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 1407 (0 pending in tls object).
253[debug] channel_set_identity_digest(): Setting remote endpoint digest on channel 0x7f6435514e60 with global ID 0 to digest 2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D
254[debug] channel_add_to_digest_map(): Added channel 0x7f6435514e60 (global ID 0) to identity map in state opening (1) with digest 2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D
255[info] connection_or_client_learned_peer_id(): Connected to router $2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D at 83.212.101.2:42782 without knowing its key. Hoping for the best.
256[notice] Learned fingerprint 2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D for bridge 83.212.101.2:42782 (with transport 'obfs3').
257[info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:42782: Authenticated it.
258[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 512 (0 pending in tls object).
259[debug] channel_change_state(): Changing state of channel 0x7f6435514e60 (global ID 0) from "opening" to "open"
260[debug] circuit_n_chan_done(): chan to NULL/83.212.101.2:42782, status=1
261[debug] circuit_n_chan_done(): Found circ, sending create cell.
262[debug] circuit_send_next_onion_skin(): First skin; sending create cell.
263[notice] Bootstrapped 15%: Establishing an encrypted directory connection.
264[debug] circuit_get_by_circid_channel_impl(): circuit_get_by_circid_channel_impl() found nothing for circ_id 7458, channel ID 0 (0x7f6435514e60)
265[debug] circuit_deliver_create_cell(): Chosen circID 7458.
266[debug] circuitmux_attach_circuit(): Attaching circuit 7458 on channel 0 to cmux 0x7f6435516040
267[debug] append_cell_to_circuit_queue(): Made a circuit active.
268[info] circuit_send_next_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
269[info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:42782; OR connection is now open, using protocol version 3. Its ID digest is 2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D. Our address is apparently 213.113.182.112.
270[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 0 (0 pending in tls object).
271[debug] conn_write_callback(): socket 10 wants to write.
272[debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain.
273[debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written
274[debug] channel_write_packed_cell(): Writing packed_cell_t 0x7f64356b9568 to channel 0x7f6435514e60 with global ID 0
275[debug] channel_flush_from_first_active_circuit(): Made a circuit inactive.
276[debug] conn_write_callback(): socket 10 wants to write.
277[debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain.
278[debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written
279[debug] connection_bucket_refill_helper(): global_read_bucket now 1073741824.
280[debug] connection_bucket_refill_helper(): global_write_bucket now 1073741824.
281[debug] connection_bucket_refill_helper(): global_relayed_read_bucket now 1073741824.
282[debug] connection_bucket_refill_helper(): or_conn->write_bucket now 1073741824.
283[debug] conn_read_callback(): socket 10 wants to read.
284[debug] connection_read_to_buf(): 10: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384.
285[debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
286[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 512 (0 pending in tls object).
287[debug] channel_queue_cell(): Directly handling incoming cell_t 0x7fff20ab3b20 for channel 0x7f6435514e60 (global ID 0)
288[debug] circuit_get_by_circid_channel_impl(): circuit_get_by_circid_channel_impl() returning circuit 0x7f6435364220 for circ_id 7458, channel ID 0 (0x7f6435514e60)
289[debug] command_process_created_cell(): at OP. Finishing handshake.
290[info] circuit_finish_handshake(): Finished building circuit hop:
291[info] internal circ (length 1, last hop 0000000000000000000000000000000000000000): $0000000000000000000000000000000000000000(open)
292[debug] command_process_created_cell(): Moving to next skin.
293[debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
294[info] circuit_send_next_onion_skin(): circuit built!
295[notice] Bootstrapped 20%: Asking for networkstatus consensus.
296[debug] connection_ap_handshake_attach_circuit(): Attaching apconn to circ 7458 (stream 0 sec old).
297[info] internal circ (length 1): $0000000000000000000000000000000000000000(open)
298[debug] link_apconn_to_circ(): attaching new conn to circ. n_circ_id 7458.
299[info] connection_ap_handshake_send_begin(): Sending relay cell 1 to begin stream 47602.
300[debug] relay_send_command_from_edge_(): delivering 13 cell forward.
301[debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
302[debug] append_cell_to_circuit_queue(): Made a circuit active.
303[debug] append_cell_to_circuit_queue(): Primed a buffer.
304[debug] channel_write_packed_cell(): Writing packed_cell_t 0x7f64356b9568 to channel 0x7f6435514e60 with global ID 0
305[debug] channel_flush_from_first_active_circuit(): Made a circuit inactive.
306[info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 7458
307[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 0 (0 pending in tls object).
308[debug] conn_write_callback(): socket 10 wants to write.
309[debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain.
310[debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written
311[debug] connection_bucket_refill_helper(): global_read_bucket now 1073741824.
312[debug] connection_bucket_refill_helper(): global_write_bucket now 1073741824.
313[debug] connection_bucket_refill_helper(): or_conn->read_bucket now 1073741824.
314[debug] connection_bucket_refill_helper(): or_conn->write_bucket now 1073741824.
315[debug] conn_read_callback(): socket 10 wants to read.
316[debug] connection_read_to_buf(): 10: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384.
317[debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
318[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 512 (0 pending in tls object).
319[debug] channel_queue_cell(): Directly handling incoming cell_t 0x7fff20ab3b20 for channel 0x7f6435514e60 (global ID 0)
320[debug] circuit_get_by_circid_channel_impl(): circuit_get_by_circid_channel_impl() returning circuit 0x7f6435364220 for circ_id 7458, channel ID 0 (0x7f6435514e60)
321[debug] relay_lookup_conn(): found conn for stream 47602.
322[debug] circuit_receive_relay_cell(): Sending to origin.
323[debug] connection_edge_process_relay_cell(): Now seen 1 relay cells here (command 4, stream 47602).
324[info] connection_edge_process_relay_cell_not_open(): 'connected' received after 1 seconds.
325[info] internal circ (length 1): $0000000000000000000000000000000000000000(open)
326[debug] connection_edge_process_relay_cell_not_open(): considering
327[debug] connection_edge_process_relay_cell_not_open(): it is! 6
328[notice] Bootstrapped 50%: Loading relay descriptors.
329[debug] circuit_consider_stop_edge_reading(): considering layer_hint->package_window 1000
330[debug] connection_edge_package_raw_inbuf(): -1: Packaging 66 bytes (0 waiting).
331[debug] relay_send_command_from_edge_(): delivering 2 cell forward.
332[debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
333[debug] append_cell_to_circuit_queue(): Made a circuit active.
334[debug] append_cell_to_circuit_queue(): Primed a buffer.
335[debug] channel_write_packed_cell(): Writing packed_cell_t 0x7f64356b9568 to channel 0x7f6435514e60 with global ID 0
336[debug] channel_flush_from_first_active_circuit(): Made a circuit inactive.
337[debug] connection_edge_package_raw_inbuf(): conn->package_window is now 499
338[debug] circuit_consider_stop_edge_reading(): considering layer_hint->package_window 999
339[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 0 (0 pending in tls object).
340[debug] conn_write_callback(): socket 10 wants to write.
341[debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain.
342[debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written
343[debug] conn_read_callback(): socket 10 wants to read.
344[debug] connection_read_to_buf(): 10: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384.
345[debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
346[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 512 (0 pending in tls object).
347[debug] channel_queue_cell(): Directly handling incoming cell_t 0x7fff20ab3b20 for channel 0x7f6435514e60 (global ID 0)
348[debug] circuit_get_by_circid_channel_impl(): circuit_get_by_circid_channel_impl() returning circuit 0x7f6435364220 for circ_id 7458, channel ID 0 (0x7f6435514e60)
349[debug] relay_lookup_conn(): found conn for stream 47602.
350[debug] circuit_receive_relay_cell(): Sending to origin.
351[debug] connection_edge_process_relay_cell(): Now seen 2 relay cells here (command 2, stream 47602).
352[debug] connection_edge_process_relay_cell(): circ deliver_window now 999.
353[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 0 (0 pending in tls object).
354[debug] conn_read_callback(): socket -1 wants to read.
355[debug] connection_dir_process_inbuf(): Got data, not eof. Leaving on inbuf.
356[debug] connection_bucket_refill_helper(): global_read_bucket now 1073741824.
357[debug] connection_bucket_refill_helper(): global_write_bucket now 1073741824.
358[debug] connection_bucket_refill_helper(): or_conn->read_bucket now 1073741824.
359[debug] connection_bucket_refill_helper(): or_conn->write_bucket now 1073741824.
360[debug] conn_read_callback(): socket 10 wants to read.
361[debug] connection_read_to_buf(): 10: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384.
362[debug] connection_read_to_buf(): After TLS read of 1024: 1098 read, 0 written
363[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 1024 (0 pending in tls object).
364[debug] channel_queue_cell(): Directly handling incoming cell_t 0x7fff20ab3b20 for channel 0x7f6435514e60 (global ID 0)
365[debug] circuit_get_by_circid_channel_impl(): circuit_get_by_circid_channel_impl() returning circuit 0x7f6435364220 for circ_id 7458, channel ID 0 (0x7f6435514e60)
366[debug] relay_lookup_conn(): found conn for stream 47602.
367[debug] circuit_receive_relay_cell(): Sending to origin.
368[debug] connection_edge_process_relay_cell(): Now seen 3 relay cells here (command 2, stream 47602).
369[debug] connection_edge_process_relay_cell(): circ deliver_window now 998.
370[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 512 (0 pending in tls object).
371[debug] channel_queue_cell(): Directly handling incoming cell_t 0x7fff20ab3b20 for channel 0x7f6435514e60 (global ID 0)
372[debug] circuit_get_by_circid_channel_impl(): circuit_get_by_circid_channel_impl() returning circuit 0x7f6435364220 for circ_id 7458, channel ID 0 (0x7f6435514e60)
373[debug] relay_lookup_conn(): found conn for stream 47602.
374[debug] circuit_receive_relay_cell(): Sending to origin.
375[debug] connection_edge_process_relay_cell(): Now seen 4 relay cells here (command 3, stream 47602).
376[info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 47602. Removing stream.
377[debug] connection_or_process_cells_from_inbuf(): 10: starting, inbuf_datalen 0 (0 pending in tls object).
378[debug] conn_close_if_marked(): Cleaning up connection (fd -1).
379[debug] conn_close_if_marked(): Flushed last 496 bytes from a linked conn; 0 left; flushlen 0; wants-to-flush==0
380[debug] connection_remove(): removing socket -1 (type Socks), n_conns now 5
381[info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
382[debug] conn_read_callback(): socket -1 wants to read.
383[debug] fetch_from_buf_http(): headerlen 199, bodylen 795.
384[debug] connection_dir_client_reached_eof(): Received response from directory server '83.212.101.2:42782': 200 "OK" (purpose: 6)
385[debug] router_new_address_suggestion(): Got X-Your-Address-Is: 213.113.182.112.
386[debug] connection_dir_client_reached_eof(): Time on received directory is within tolerance; we are 0 seconds skewed.  (That's okay.)
387[info] connection_dir_client_reached_eof(): Received server info (size 1120) from server '83.212.101.2:42782'
388[debug] router_parse_list_from_string(): Read router '$2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D~bzoum at 83.212.101.2', purpose 'bridge'
389[info] router_load_routers_from_string(): 1 elements to add
390[debug] compute_weighted_bandwidths(): Got negative bandwidth weights. Defaulting to old selection algorithm.
391[info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'bzoum' to match configured address 83.212.101.2:42782.
392[notice] new bridge descriptor 'bzoum' (fresh): $2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D~bzoum at 83.212.101.2
393[notice] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
394[debug] compute_weighted_bandwidths(): Got negative bandwidth weights. Defaulting to old selection algorithm.
395[debug] compute_weighted_bandwidths(): Got negative bandwidth weights. Defaulting to old selection algorithm.
396[debug] conn_close_if_marked(): Cleaning up connection (fd -1).
397[debug] connection_remove(): removing socket -1 (type Directory), n_conns now 4
398[info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
399[debug] connection_bucket_refill_helper(): global_read_bucket now 1073741824.
400[debug] connection_bucket_refill_helper(): or_conn->read_bucket now 1073741824.
401[notice] Interrupt: exiting cleanly.
402[info] or_state_save(): Saved state to "/tmp/tmptor/state"
403[info] tor_process_handle_destroy(): Terminated process with PID '15732'.
404[debug] channel_tls_free_all(): Shutting down TLS channels...
405[debug] channel_tls_free_all(): Done shutting down TLS channels
406[debug] channel_free_all(): Shutting down channels...
407[debug] channel_free_list(): Cleaning up channel 0x7f6435514e60 (global ID 0) in state open (2)
408[debug] channel_remove_from_digest_map(): Removed channel 0x7f6435514e60 (global ID 0) from identity map in state open (2) with digest 2ADFE7AA8D272C520D1FBFBF4E413F3A1B26313D
409[debug] channel_mark_for_close(): Closing channel 0x7f6435514e60 (global ID 0) by request
410[debug] channel_change_state(): Changing state of channel 0x7f6435514e60 (global ID 0) from "open" to "closing"
411[debug] connection_mark_for_close_internal_(): Calling connection_mark_for_close_internal_() on an OR conn at src/or/connection_or.c:1171
412[debug] channel_force_free(): Force-freeing channel 0 at 0x7f6435514e60
413[debug] channel_clear_remote_end(): Clearing remote endpoint identity on channel 0x7f6435514e60 with global ID 0
414[debug] circuitmux_free(): Freeing cmux at 0x7f6435516040 with no queued destroys, the cmux destroy balance was 0, global is 0
415[debug] channel_free_all(): Freeing channel_identity_map
416[debug] channel_free_all(): Done cleaning up after channels
417[debug] connection_free_(): closing fd 6.
418[debug] connection_free_(): closing fd 7.
419[debug] connection_free_(): closing fd 10.
420[info] buf_shrink_freelists(): Cleaned freelist for 4096-byte chunks: original length 2, kept 0, dropped 2.
421[info] buf_shrink_freelists(): Cleaned freelist for 8192-byte chunks: original length 0, kept 0, dropped 0.
422[info] buf_shrink_freelists(): Cleaned freelist for 16384-byte chunks: original length 0, kept 0, dropped 0.
423[info] buf_shrink_freelists(): Cleaned freelist for 32768-byte chunks: original length 1, kept 0, dropped 1.
424[info] tor_lockfile_unlock(): Unlocking "/tmp/tmptor/lock"