Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread teor

> On 24 May 2018, at 11:48, Keifer Bly  wrote:
> 
> What does it mean? Does it mean my relay will be unreachable? Thank you.

This bug happens because Tor doesn't check for relay information correctly.

It's harmless on relays, and you should ignore it.

T
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread Keifer Bly
What does it mean? Does it mean my relay will be unreachable? Thank you.

Sent from my iPhone

> On May 24, 2018, at 11:40 AM, teor  wrote:
> 
> Hi,
> 
>> On 24 May 2018, at 11:27, Keifer Bly  wrote:
>> 
>> May 24 11:24:14.000 [warn] Bug: Non-fatal assertion info || client failed in 
>> onion_extend_cpath at src/or/circuitbuild.c:2772. Stack trace: (on Tor 
>> 0.3.3.6 7dd0813e783ae16e)
> 
> Thanks for reporting this bug!
> 
> It's a known issue, and we are testing a fix in our master branch and alpha 
> releases:
> https://trac.torproject.org/projects/tor/ticket/25692
> 
> I have asked if we can backport the fix to the next 0.3.3 release:
> https://trac.torproject.org/projects/tor/ticket/25691#comment:25
> 
> T
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread teor
Hi,

> On 24 May 2018, at 11:27, Keifer Bly  wrote:
> 
> May 24 11:24:14.000 [warn] Bug: Non-fatal assertion info || client failed in 
> onion_extend_cpath at src/or/circuitbuild.c:2772. Stack trace: (on Tor 
> 0.3.3.6 7dd0813e783ae16e)

Thanks for reporting this bug!

It's a known issue, and we are testing a fix in our master branch and alpha 
releases:
https://trac.torproject.org/projects/tor/ticket/25692

I have asked if we can backport the fix to the next 0.3.3 release:
https://trac.torproject.org/projects/tor/ticket/25691#comment:25

T___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread Keifer Bly
EDIT: It also just popped up with "May 24 11:25:18.000 [notice] Performing 
bandwidth self-test…done.”

Thank you.
> On May 24, 2018, at 11:22 AM, Colin Childs  wrote:
> 
> Hi Keifer,
> 
> When doing Tor version upgrades (and not just config changes), there is no 
> way to restart the process without losing uptime; as uptime records the 
> amount of time that the Tor process has been running without interruption. 
> 
> When doing version upgrades, stopping your previous version of tor and 
> starting the new version is required, this cannot be done without 
> interrupting the uptime. That said, uptime is not a super important stat. It 
> is more important that you keep your tor daemon / system up to date than go 
> for high uptime numbers.
> 
> Thanks for running relays!
> 
>> On May 24, 2018, at 1:01 PM, Keifer Bly  wrote:
>> 
>> “killall tor” to stop the process then “tor” to start it again usually 
>> works, but I wonder if there is a way to do this without loosing uptime as 
>> this does? Thank you.
>> 
>> Sent from my iPhone
>> 
>>> On May 24, 2018, at 4:30 AM, Ralph Seichter  wrote:
>>> 
 On 24.05.18 08:17, Valter Jansons wrote:
 
 I have not worked on macOS services, but as I understand it, executing
 `sudo launchctl stop servicename && sudo launchctl stop servicename`
 should do the job for restarting the service [...]
>>> 
>>> That might not work as intended, depending on macOS version and service
>>> configuration details. Both "stop" and "start" are legacy subcommands
>>> aimed at on-demand services and older launchd implementations.
>>> 
 Maybe just restarting the box is an easier method of restarting the
 Tor service.
>>> 
>>> Probably.
>>> 
>>> -Ralph
>>> ___
>>> tor-relays mailing list
>>> tor-relays@lists.torproject.org
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread Keifer Bly
Hi, so I just restarted tor process, and this is the output 

May 24 11:23:59.876 [notice] Tor 0.3.3.6 (git-7dd0813e783ae16e) running on 
Darwin with Libevent 2.1.8-stable, OpenSSL 1.0.2o, Zlib 1.2.11, Liblzma N/A, 
and Libzstd N/A.
May 24 11:23:59.877 [notice] Tor can't help you if you use it wrong! Learn how 
to be safe at https://www.torproject.org/download/download#warning
May 24 11:23:59.891 [notice] Read configuration file "/usr/local/etc/tor/torrc".
May 24 11:23:59.894 [notice] Based on detected system memory, MaxMemInQueues is 
set to 3276 MB. You can override this by setting MaxMemInQueues by hand.
May 24 11:23:59.895 [notice] Scheduler type KISTLite has been enabled.
May 24 11:23:59.895 [notice] Opening OR listener on 0.0.0.0:9002
May 24 11:24:00.000 [notice] Parsing GEOIP IPv4 file 
/usr/local/Cellar/tor/0.3.3.6/share/tor/geoip.
May 24 11:24:00.000 [notice] Parsing GEOIP IPv6 file 
/usr/local/Cellar/tor/0.3.3.6/share/tor/geoip6.
May 24 11:24:00.000 [notice] Configured to measure statistics. Look for the 
*-stats files that will first be written to the data directory in 24 hours from 
now.
May 24 11:24:01.000 [notice] Your Tor server's identity key fingerprint is 
'torland DB1AF6477BB276B6EA5E72132684096EEE779D30'
May 24 11:24:01.000 [notice] Bootstrapped 0%: Starting
May 24 11:24:13.000 [notice] Starting with guard context "default"
May 24 11:24:13.000 [notice] Bootstrapped 80%: Connecting to the Tor network
May 24 11:24:13.000 [notice] Guessed our IP address as 71.80.215.102 (source: 
204.13.164.118).
May 24 11:24:14.000 [notice] Self-testing indicates your ORPort is reachable 
from the outside. Excellent. Publishing server descriptor.
May 24 11:24:14.000 [warn] tor_bug_occurred_: Bug: src/or/circuitbuild.c:2772: 
onion_extend_cpath: Non-fatal assertion info || client failed. (on Tor 0.3.3.6 
7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: Non-fatal assertion info || client failed in 
onion_extend_cpath at src/or/circuitbuild.c:2772. Stack trace: (on Tor 0.3.3.6 
7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 0   tor 
0x00010b5c836b log_backtrace + 73 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 1   tor 
0x00010b5dfe75 tor_bug_occurred_ + 266 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 2   tor 
0x00010b4bda7a circuit_establish_circuit + 2340 (on Tor 0.3.3.6 
7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 3   tor 
0x00010b4cf6b3 circuit_build_needed_circs + 436 (on Tor 0.3.3.6 
7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 4   tor 
0x00010b55ce07 second_elapsed_callback + 803 (on Tor 0.3.3.6 
7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 5   libevent-2.1.6.dylib
0x00010b72e9c2 event_process_active_single_queue + 1057 (on Tor 0.3.3.6 
7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 6   libevent-2.1.6.dylib
0x00010b72bcb3 event_base_loop + 1074 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 7   tor 
0x00010b55c865 do_main_loop + 1377 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 8   tor 
0x00010b55ebf5 tor_run_main + 174 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 9   tor 
0x00010b5c420d tor_main + 70 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 10  tor 
0x00010b4aa253 main + 27 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 11  libdyld.dylib   
0x7fff65c52015 start + 1 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Bug: 12  ??? 
0x0001 0x0 + 1 (on Tor 0.3.3.6 7dd0813e783ae16e)
May 24 11:24:14.000 [warn] Failed to find node for hop #1 of our path. 
Discarding this circuit.
May 24 11:24:14.000 [notice] Bootstrapped 85%: Finishing handshake with first 
hop
May 24 11:24:16.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
May 24 11:24:17.000 [notice] Tor has successfully opened a circuit. Looks like 
client functionality is working.
May 24 11:24:17.000 [notice] Bootstrapped 100%: Done

Is the “tor_bug_occured” and “client failed” and all of that text something to 
be concerned about?

Thank you.

I have been keeping homebrew as well as the macOS operating system up to date 
as well as tor.



> On May 24, 2018, at 11:22 AM, Colin Childs  wrote:
> 
> Hi Keifer,
> 
> When doing Tor version upgrades (and not just config changes), there is no 
> way to restart the process without losing uptime; as uptime records the 
> amount of time that the Tor process has been running without interruption. 
> 
> When doing version upgrades, stopping your previous

Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread Colin Childs
Hi Keifer,

When doing Tor version upgrades (and not just config changes), there is no way 
to restart the process without losing uptime; as uptime records the amount of 
time that the Tor process has been running without interruption. 

When doing version upgrades, stopping your previous version of tor and starting 
the new version is required, this cannot be done without interrupting the 
uptime. That said, uptime is not a super important stat. It is more important 
that you keep your tor daemon / system up to date than go for high uptime 
numbers.

Thanks for running relays!

> On May 24, 2018, at 1:01 PM, Keifer Bly  wrote:
> 
> “killall tor” to stop the process then “tor” to start it again usually works, 
> but I wonder if there is a way to do this without loosing uptime as this 
> does? Thank you.
> 
> Sent from my iPhone
> 
>> On May 24, 2018, at 4:30 AM, Ralph Seichter  wrote:
>> 
>>> On 24.05.18 08:17, Valter Jansons wrote:
>>> 
>>> I have not worked on macOS services, but as I understand it, executing
>>> `sudo launchctl stop servicename && sudo launchctl stop servicename`
>>> should do the job for restarting the service [...]
>> 
>> That might not work as intended, depending on macOS version and service
>> configuration details. Both "stop" and "start" are legacy subcommands
>> aimed at on-demand services and older launchd implementations.
>> 
>>> Maybe just restarting the box is an easier method of restarting the
>>> Tor service.
>> 
>> Probably.
>> 
>> -Ralph
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread Keifer Bly
“killall tor” to stop the process then “tor” to start it again usually works, 
but I wonder if there is a way to do this without loosing uptime as this does? 
Thank you.

Sent from my iPhone

> On May 24, 2018, at 4:30 AM, Ralph Seichter  wrote:
> 
>> On 24.05.18 08:17, Valter Jansons wrote:
>> 
>> I have not worked on macOS services, but as I understand it, executing
>> `sudo launchctl stop servicename && sudo launchctl stop servicename`
>> should do the job for restarting the service [...]
> 
> That might not work as intended, depending on macOS version and service
> configuration details. Both "stop" and "start" are legacy subcommands
> aimed at on-demand services and older launchd implementations.
> 
>> Maybe just restarting the box is an easier method of restarting the
>> Tor service.
> 
> Probably.
> 
> -Ralph
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-24 Thread Ralph Seichter
On 24.05.18 08:17, Valter Jansons wrote:

> I have not worked on macOS services, but as I understand it, executing
> `sudo launchctl stop servicename && sudo launchctl stop servicename`
> should do the job for restarting the service [...]

That might not work as intended, depending on macOS version and service
configuration details. Both "stop" and "start" are legacy subcommands
aimed at on-demand services and older launchd implementations.

> Maybe just restarting the box is an easier method of restarting the
> Tor service.

Probably.

-Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-23 Thread Valter Jansons
> Here is something I have noticed,  my computer says it’s running
> tor 0.3.3.6 (upgraded today), but my status at
> https://metrics.torproject.org/rs.html#details/DB1AF6477BB276B6EA5E72132684096EEE779D30
> says it’s running a different version (0.3.2.10). Any idea on why this might
> be happening?

As the uptime is more than 27 days, I would guess the Tor server
software itself has not been restarted to actually use the updated
version (0.3.3.6) and it still running on the old version (0.3.2.10)
that was installed previously.

I have not worked on macOS services, but as I understand it, executing
`sudo launchctl stop servicename && sudo launchctl stop servicename`
should do the job for restarting the service, and `sudo launchctl
list` should show the list of services so that you can find the
service name itself. Maybe just restarting the box is an easier method
of restarting the Tor service.

-- 4096R/A83CE748 Valters Jansons
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-23 Thread Keifer Bly
Thank you. Here is something I have noticed,  my computer says it’s running tor 
0.3.3.6 (upgraded today), but my status at 
https://metrics.torproject.org/rs.html#details/DB1AF6477BB276B6EA5E72132684096EEE779D30
 says it’s running a different version (0.3.2.10). Any idea on why this might 
be happening? Thanks very much.

Sent from my iPhone

> On May 23, 2018, at 12:46 PM, nusenu  wrote:
> 
> 
> 
> Keifer Bly:
>> I am also wondering, I have this email address in the “ContactInfo” in my 
>> torn file for tor project to contact me regarding issues with my relay, etc, 
>> but am wondering if there is a way to have this email for them to contact 
>> without displaying it publicly on my relay?
> 
> The ContactInfo string is always public, but you can protect your current 
> email from spamers by creating a second
> email address just for your ContactInfo field. (or by obfuscating it)
> 
> -- 
> https://mastodon.social/@nusenu
> twitter: @nusenu_
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Software Update Question

2018-05-23 Thread nusenu


Keifer Bly:
> I am also wondering, I have this email address in the “ContactInfo” in my 
> torn file for tor project to contact me regarding issues with my relay, etc, 
> but am wondering if there is a way to have this email for them to contact 
> without displaying it publicly on my relay?

The ContactInfo string is always public, but you can protect your current email 
from spamers by creating a second
email address just for your ContactInfo field. (or by obfuscating it)

-- 
https://mastodon.social/@nusenu
twitter: @nusenu_



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Software Update Question

2018-05-23 Thread Keifer Bly
Hello,

So I just updated the tor software using command “brew upgrade tor” on macOS. 
It upgraded from tor 0.3.3.0 to tor 0.3.3.6. I am wondering, do I need to 
restart my relay after doing this?

I am also wondering, I have this email address in the “ContactInfo” in my torn 
file for tor project to contact me regarding issues with my relay, etc, but am 
wondering if there is a way to have this email for them to contact without 
displaying it publicly on my relay?

Thank you very much.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays