Opened 11 years ago

Last modified 7 years ago

#839 closed defect (Not a bug)

Tor 0.2.0.31 (r16744) crash on OpenBSD 4.3-stable (GENERIC)

Reported by: fredzupy Owned by:
Priority: Low Milestone:
Component: Core Tor/Tor Version: 0.2.0.31
Severity: Keywords:
Cc: fredzupy, nickm, arma Actual Points:
Parent ID: Points:
Reviewer: Sponsor:

Description

After only 3 days online, my new Tor relay crashed with no error in log.

Here is the backtrace from the core :

#0 0x0eb5828d in kill () from /usr/lib/libc.so.43.0
#1 0x0eb90833 in abort () at /usr/src/lib/libc/stdlib/abort.c:68
#2 0x0eb31817 in assert2 (file=0x2742ace0 "/usr/src/lib/libssl/src/crypto/rand/md_rand.c", line=313, func=0x2742ac74 "ssleay_rand_add",

failedexpr=0x2742ad80 "md_c[1] == md_count[1]") at /usr/src/lib/libc/gen/assert.c:52

#3 0x07492eb4 in ssleay_rand_add (buf=0xcfbccd7c, num=4, add=0) at /usr/src/lib/libssl/src/crypto/rand/md_rand.c:219
#4 0x0749282e in RAND_add (buf=0xcfbccd78, num=4, entropy=0) at /usr/src/lib/libssl/src/crypto/rand/rand_lib.c:167
#5 0x0036f9e3 in ssl23_connect (s=0x7fd8ec00) at /usr/src/lib/libssl/src/ssl/s23_clnt.c:114
#6 0x0037ac09 in SSL_connect (s=0x7fd8ec00) at /usr/src/lib/libssl/src/ssl/ssl_lib.c:825
#7 0x1c090d3f in tor_tls_handshake (tls=0x82987900) at tortls.c:936
#8 0x1c02b3e2 in connection_tls_continue_handshake (conn=0x84984900) at connection_or.c:629
#9 0x1c0219af in connection_read_to_buf (conn=0x84984900, max_to_read=0xcfbcce58) at connection.c:1950
#10 0x1c021338 in connection_handle_read (conn=0x84984900) at connection.c:1843
#11 0x1c04e990 in conn_read_callback (fd=181, event=2, _conn=0x84984900) at main.c:457
#12 0x0bcb6214 in event_process_active (base=0x839da1c0) at /usr/src/lib/libevent/event.c:317
#13 0x0bcb6482 in event_base_loop (base=0x839da1c0, flags=0) at /usr/src/lib/libevent/event.c:433
#14 0x0bcb631b in event_loop (flags=0) at /usr/src/lib/libevent/event.c:368
#15 0x1c050467 in do_main_loop () at main.c:1447
#16 0x1c0512c1 in tor_main (argc=3, argv=0xcfbccfe4) at main.c:1990
#17 0x1c07e7b7 in main (argc=3, argv=0xcfbccfe4) at tor_main.c:29

[Automatically added by flyspray2trac: Operating System: BSD]

Child Tickets

Change History (6)

comment:1 Changed 11 years ago by nickm

What version of OpenSSL do you have? Some versions have a bug with adding entropy to the pool when there
are already a lot of open connections. Versions after 0.9.7k and 0.9.8c should be safe.

comment:2 Changed 11 years ago by fredzupy

I have OpenSSL 0.9.7j, so may be an OpenSSL problem.
Thanks.

comment:3 Changed 11 years ago by arma

Did an openssl upgrade fix it?

(Can we close this bug? :)

comment:4 Changed 11 years ago by fredzupy

It seems to be an assertion problem when OpenSSL is *not* compiled with OPENSSL_THREADS.
OpenSSL under OpenBSD is already patched for the problem that Nick was talking about.
I have just recompiled my version of OpenSSL with this directive and cross my finguers since more than 4 days now :)

Since this bug isn't Tor related, you can, of course, close this bug :)

comment:5 Changed 11 years ago by nickm

flyspray2trac: bug closed.

comment:6 Changed 7 years ago by nickm

Component: Tor RelayTor
Note: See TracTickets for help on using tickets.