#27731 closed defect (fixed)

tor restart loop: "The missing protocols are: LinkAuth=1"

Reported by: traumschule Owned by:
Priority: Medium Milestone:
Component: Core Tor/Tor Version: Tor: unspecified
Severity: Normal Keywords:
Cc: Actual Points:
Parent ID: #27288 Points:
Reviewer: Sponsor:

Description (last modified by traumschule)

Since the (automatic) apt upgrade to 0.3.5.0-alpha-dev-20180916T182348Z-1~d99.buster+1 tor restarted in a loop:

Sep 17 01:05:24.000 [err] {GENERAL} At least one protocol listed as required in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will not work as a clien
t on the Tor network. The missing protocols are: LinkAuth=1
Sep 17 01:05:26.000 [notice] Tor 0.3.5.0-alpha-dev opening log file.
Sep 17 01:05:26.531 [notice] Tor 0.3.5.0-alpha-dev running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.0h, Zlib 1.2.11, Liblzma 5.2.2, and Libzstd 1.3.5.
Sep 17 01:05:26.539 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Sep 17 01:05:26.539 [notice] This version is not a stable Tor release. Expect more bugs than usual.
Sep 17 01:05:26.540 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Sep 17 01:05:26.540 [notice] Read configuration file "/etc/tor/torrc".
Sep 17 01:05:26.590 [notice] Opening Socks listener on 127.0.0.1:9050
Sep 17 01:05:26.591 [notice] Opened Socks listener on 127.0.0.1:9050
Sep 17 01:05:26.591 [notice] Opening HTTP tunnel listener on 127.0.0.1:9099
Sep 17 01:05:26.592 [notice] Opened HTTP tunnel listener on 127.0.0.1:9099
Sep 17 01:05:26.592 [notice] Opening Control listener on 127.0.0.1:9051
Sep 17 01:05:26.592 [notice] Opened Control listener on 127.0.0.1:9051
Sep 17 01:05:26.000 [warn] {GENERAL} Your log may contain sensitive information - you disabled SafeLogging, and you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
Sep 17 01:05:26.000 [info] {GENERAL} options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh 65440, ConnLimit_low_thresh 49128
Sep 17 01:05:26.000 [info] {GENERAL} or_state_load(): Loaded state from "/var/lib/tor/state"
Sep 17 01:05:26.000 [info] {GUARD} sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
Sep 17 01:05:26.000 [info] {GUARD} sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
Sep 17 01:05:26.000 [info] {GUARD} sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
Sep 17 01:05:26.000 [info] {GUARD} entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
Sep 17 01:05:26.000 [info] {GUARD} sample_reachable_filtered_entry_guards():   (After filters [b], we have 0 guards to consider.)
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state(): Adding 11 timeouts.
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state(): Loaded 1000/1000 values from 48 lines in circuit time histogram
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode #0: 575 91
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode #1: 675 70
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode #2: 375 85
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Set buildtimeout to low value 871.512173ms. Setting to 1500ms
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Based on 1000 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 2 seconds.
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Circuit timeout data: 1500.000000ms, 60000.000000ms, Xm: 534, a: 3.285680, r: 0.046000
Sep 17 01:05:26.000 [info] {FS} read_file_to_str(): Could not open "/var/lib/tor/router-stability": No such file or directory
Sep 17 01:05:26.000 [info] {GENERAL} init_cookie_authentication(): Generated auth cookie file in '"/var/run/tor/control.authcookie"'.
Sep 17 01:05:26.000 [info] {SCHED} scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
Sep 17 01:05:26.000 [info] {OR} cmux_ewma_set_options(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
Sep 17 01:05:26.000 [notice] {GENERAL} Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Sep 17 01:05:27.000 [notice] {GENERAL} Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Sep 17 01:05:27.000 [info] {CIRC} add_predicted_port(): New port prediction added. Will continue predictive circ building for 2079 more seconds.
Sep 17 01:05:27.000 [info] {CRYPTO} crypto_openssl_late_init(): NOT using OpenSSL engine support.
Sep 17 01:05:27.000 [info] {CRYPTO} evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
Sep 17 01:05:27.000 [notice] {CONTROL} Bootstrapped 0%: Starting
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority maatuska with signing key 10A69F531F8421310537EAC881F7DD354F251D31
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dannenberg with signing key CD1FD971855430880D3C31E0331C5C55800C2F79
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority gabelmoo with signing key E1249D5F87EAD43CD4A48DF9CFCFE810BEEE5287
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority tor26 with signing key 719A962F8F7DC7F0A34A545E7A45368FF8A23D2A
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority Faravahar with signing key 517095062288D1B5C7BD6517A677C586D996818B
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
Sep 17 01:05:28.000 [err] {GENERAL} At least one protocol listed as required in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will not work as a client on the Tor network. The missing protocols are: LinkAuth=1
[restart]
Sep 17 01:06:08.000 [info] {GENERAL} options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh 65440, ConnLimit_low_thresh 49128
Sep 17 01:06:08.000 [info] {FS} tor_lockfile_lock(): Locking "/var/lib/tor/lock"

Downgrading fixed it. git HEAD is also affected, last working commit in master: 035166e7bf30645f6da9d39374f5e9c9efe867f8

dpkg -i  /var/cache/apt/archives/tor_0.3.5.0-alpha-dev-20180915T011035Z-1~d99.buster+1_i386.deb

Tor version 0.3.5.0-alpha-dev (git-035166e7bf30645f).

First failing:
http://jqs44zhtxl2uo6gk.onion/tor.git/commit/?id=991bec67ee41fd7f3c12e9194d96491b51bedd50

Child Tickets

Change History (3)

comment:1 Changed 11 months ago by teor

Parent ID: #27288

comment:2 Changed 11 months ago by traumschule

Description: modified (diff)

add missing log lines

comment:3 Changed 11 months ago by traumschule

Resolution: fixed
Status: newclosed

fixed in current nightly and master HEAD

Note: See TracTickets for help on using tickets.