** Description changed: - On Xenial, when an application is used through tsocks, it will systematically segfqult: - $ ssh machine - [connection OK] - $ wget http://example.com/some/path - [download succeeds] - $ tsocks ssh machine - Segmentation fault - $ tsocks wget http://example.com/some/path - Segmentation fault + $ ssh machine + [connection OK] + $ wget http://example.com/some/path + [download succeeds] + $ tsocks ssh machine + Segmentation fault + $ tsocks wget http://example.com/some/path + Segmentation fault - $ lsb_release -rd - Description: Ubuntu 16.04 LTS - Release: 16.04 + $ lsb_release -rd + Description: Ubuntu 16.04 LTS + Release: 16.04 - $ apt-cache policy tsocks - tsocks: - Installed: 1.8beta5-9.3 - Candidate: 1.8beta5-9.3 - Version table: - *** 1.8beta5-9.3 500 - 500 http://fr.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages - 100 /var/lib/dpkg/status + $ apt-cache policy tsocks + tsocks: + Installed: 1.8beta5-9.3 + Candidate: 1.8beta5-9.3 + Version table: + *** 1.8beta5-9.3 500 + 500 http://fr.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages + 100 /var/lib/dpkg/status Expected: connections through tsocks succeed What happens: connections through tsocks systematically segfault Here's my tsocks.conf: - $ cat /etc/tsocks.conf - local = 192.168.0.0/255.255.0.0 - server = 127.0.0.1 - server_port = 8083 - server_type = 5 + $ cat /etc/tsocks.conf + local = 192.168.0.0/255.255.0.0 + server = 127.0.0.1 + server_port = 8083 + server_type = 5 Running through gdb: - $ gdb ssh machine - [...] - (gdb) run - Starting program: /usr/bin/ssh - [Thread debugging using libthread_db enabled] - Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". + $ gdb ssh machine + [...] + (gdb) run + Starting program: /usr/bin/ssh + [Thread debugging using libthread_db enabled] + Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". - Program received signal SIGSEGV, Segmentation fault. - 0x0000000000000000 in ?? () - (gdb) bt - #0 0x0000000000000000 in ?? () - #1 0x00007ffff7670e77 in poll (__timeout=10, __nfds=1, __fds=0x7fffffffdb70) - at /usr/include/x86_64-linux-gnu/bits/poll2.h:46 - #2 RAND_poll () at rand_unix.c:325 - #3 0x00007ffff766fbd5 in ssleay_rand_bytes (buf=0x555555804010 "\212\003", num=num@entry=60, - pseudo=pseudo@entry=0, lock=lock@entry=0) at md_rand.c:398 - #4 0x00007ffff7670603 in drbg_get_entropy (ctx=<optimized out>, pout=0x7fffffffdec0, - entropy=<optimized out>, min_len=60, max_len=<optimized out>) at rand_lib.c:199 - #5 0x00007ffff76e6278 in fips_get_entropy (dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>, - pout=pout@entry=0x7fffffffdf30, entropy=<optimized out>, min_len=<optimized out>, - max_len=2147483632) at fips_drbg_lib.c:151 - #6 0x00007ffff76e6904 in FIPS_drbg_instantiate (dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>, - pers=pers@entry=0x7fffffffdf80 "OpenSSL DRBG2.0", perslen=perslen@entry=32) - at fips_drbg_lib.c:223 - #7 0x00007ffff7670993 in RAND_init_fips () at rand_lib.c:302 - #8 0x00007ffff75b3f7a in OPENSSL_init_library () at o_init.c:119 - #9 0x00007ffff7de74ea in call_init (l=<optimized out>, argc=argc@entry=1, - argv=argv@entry=0x7fffffffe078, env=env@entry=0x7fffffffe088) at dl-init.c:72 - #10 0x00007ffff7de75fb in call_init (env=0x7fffffffe088, argv=0x7fffffffe078, argc=1, - l=<optimized out>) at dl-init.c:30 - #11 _dl_init (main_map=0x7ffff7ffe168, argc=1, argv=0x7fffffffe078, env=0x7fffffffe088) - at dl-init.c:120 - #12 0x00007ffff7dd7cfa in _dl_start_user () from /lib64/ld-linux-x86-64.so.2 - #13 0x0000000000000001 in ?? () - #14 0x00007fffffffe4da in ?? () - #15 0x0000000000000000 in ?? () + Program received signal SIGSEGV, Segmentation fault. + 0x0000000000000000 in ?? () + (gdb) bt + #0 0x0000000000000000 in ?? () + #1 0x00007ffff7670e77 in poll (__timeout=10, __nfds=1, __fds=0x7fffffffdb70) + at /usr/include/x86_64-linux-gnu/bits/poll2.h:46 + #2 RAND_poll () at rand_unix.c:325 + #3 0x00007ffff766fbd5 in ssleay_rand_bytes (buf=0x555555804010 "\212\003", num=num@entry=60, + pseudo=pseudo@entry=0, lock=lock@entry=0) at md_rand.c:398 + #4 0x00007ffff7670603 in drbg_get_entropy (ctx=<optimized out>, pout=0x7fffffffdec0, + entropy=<optimized out>, min_len=60, max_len=<optimized out>) at rand_lib.c:199 + #5 0x00007ffff76e6278 in fips_get_entropy (dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>, + pout=pout@entry=0x7fffffffdf30, entropy=<optimized out>, min_len=<optimized out>, + max_len=2147483632) at fips_drbg_lib.c:151 + #6 0x00007ffff76e6904 in FIPS_drbg_instantiate (dctx=dctx@entry=0x7ffff79a9960 <ossl_dctx>, + pers=pers@entry=0x7fffffffdf80 "OpenSSL DRBG2.0", perslen=perslen@entry=32) + at fips_drbg_lib.c:223 + #7 0x00007ffff7670993 in RAND_init_fips () at rand_lib.c:302 + #8 0x00007ffff75b3f7a in OPENSSL_init_library () at o_init.c:119 + #9 0x00007ffff7de74ea in call_init (l=<optimized out>, argc=argc@entry=1, + argv=argv@entry=0x7fffffffe078, env=env@entry=0x7fffffffe088) at dl-init.c:72 + #10 0x00007ffff7de75fb in call_init (env=0x7fffffffe088, argv=0x7fffffffe078, argc=1, + l=<optimized out>) at dl-init.c:30 + #11 _dl_init (main_map=0x7ffff7ffe168, argc=1, argv=0x7fffffffe078, env=0x7fffffffe088) + at dl-init.c:120 + #12 0x00007ffff7dd7cfa in _dl_start_user () from /lib64/ld-linux-x86-64.so.2 + #13 0x0000000000000001 in ?? () + #14 0x00007fffffffe4da in ?? () + #15 0x0000000000000000 in ?? () Since Xenial does not have debugging symbols for tsocks, I can't provide much more (although I'd gladly follow a quick and simple tutorial on doing so). For the record, it was working in Wily (15.10) and all previous versions.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1574270 Title: applications segfault systematically with tsocks To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tsocks/+bug/1574270/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs