SHARE
TWEET

asdg465efv

a guest Feb 16th, 2018 3 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Feb 17 03:50:43.000 [notice] Tor 0.2.9.14 (git-a211f886ad759cab) opening new log file.
  2. Feb 17 03:50:43.654 [notice] Tor 0.2.9.14 (git-a211f886ad759cab) running on Linux with Libevent 2.0.21-stable, OpenSSL 1.1.0f and Zlib 1.2.8.
  3. Feb 17 03:50:43.660 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
  4. Feb 17 03:50:43.660 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
  5. Feb 17 03:50:43.661 [notice] Read configuration file "/etc/tor/torrc".
  6. Feb 17 03:50:43.717 [notice] Based on detected system memory, MaxMemInQueues is set to 325 MB. You can override this by setting MaxMemInQueues by hand.
  7. Feb 17 03:50:43.736 [notice] Opening Socks listener on 127.0.0.1:9050
  8. Feb 17 03:50:43.741 [notice] Opening Control listener on 127.0.0.1:9051
  9. Feb 17 03:50:43.741 [notice] Opening OR listener on 0.0.0.0:9001
  10. Feb 17 03:50:43.741 [notice] Opening Directory listener on 0.0.0.0:9030
  11. Feb 17 03:50:43.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
  12. Feb 17 03:50:43.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh 65440, ConnLimit_low_thresh 49128
  13. Feb 17 03:50:43.000 [notice] Not disabling debugger attaching for unprivileged users.
  14. Feb 17 03:50:43.000 [info] tor_lockfile_lock(): Locking "/var/lib/tor/lock"
  15. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 278.645508/295.100098 path bias for node Unnamed
  16. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 98.334559/98.334559 path use bias for node Unnamed
  17. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 17.000000/17.000000 path bias for node ZaeziPfupf
  18. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 15.000000/15.000000 path use bias for node ZaeziPfupf
  19. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 9.000000/9.000000 path bias for node Autumn
  20. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 6.000000/6.000000 path use bias for node Autumn
  21. Feb 17 03:50:43.000 [info] or_state_load(): Loaded state from "/var/lib/tor/state"
  22. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 278.645508/295.100098 path bias for node Unnamed
  23. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 98.334559/98.334559 path use bias for node Unnamed
  24. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 17.000000/17.000000 path bias for node ZaeziPfupf
  25. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 15.000000/15.000000 path use bias for node ZaeziPfupf
  26. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 9.000000/9.000000 path bias for node Autumn
  27. Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 6.000000/6.000000 path use bias for node Autumn
  28. Feb 17 03:50:43.000 [info] circuit_build_times_parse_state(): Adding 10 timeouts.
  29. Feb 17 03:50:43.000 [info] circuit_build_times_parse_state(): Loaded 1000/1000 values from 228 lines in circuit time histogram
  30. Feb 17 03:50:43.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
  31. Feb 17 03:50:43.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
  32. Feb 17 03:50:43.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4775 27
  33. Feb 17 03:50:44.000 [info] circuit_build_times_set_timeout(): Based on 1000 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 7 seconds.
  34. Feb 17 03:50:44.000 [info] circuit_build_times_set_timeout(): Circuit timeout data: 6844.496386ms, 60000.000000ms, Xm: 4772, a: 4.462240, r: 0.140000
  35. Feb 17 03:50:44.000 [info] read_file_to_str(): Could not open "/var/lib/tor/router-stability": No such file or directory
  36. Feb 17 03:50:44.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/var/run/tor/control.authcookie"'.
  37. Feb 17 03:50:44.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
  38. Feb 17 03:50:44.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
  39. Feb 17 03:50:47.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
  40. Feb 17 03:50:49.000 [info] options_act(): Configured to measure hidden service statistics.
  41. Feb 17 03:50:49.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
  42. Feb 17 03:50:49.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: config change
  43. Feb 17 03:50:49.000 [info] crypto_global_init(): NOT using OpenSSL engine support.
  44. Feb 17 03:50:49.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
  45. Feb 17 03:50:49.000 [info] configure_nameservers(): Parsing resolver configuration in '/etc/resolv.conf'
  46. Feb 17 03:50:49.000 [info] eventdns: Parsing resolv.conf file /etc/resolv.conf
  47. Feb 17 03:50:49.000 [info] eventdns: Added nameserver 192.168.2.1:53 as 0x1ccd298
  48. Feb 17 03:50:49.000 [info] eventdns: Setting maximum allowed timeouts to 255
  49. Feb 17 03:50:49.000 [info] eventdns: Setting retries to 1
  50. Feb 17 03:50:49.000 [info] eventdns: Setting maximum inflight requests to 8192
  51. Feb 17 03:50:49.000 [info] eventdns: Setting timeout to 5
  52. Feb 17 03:50:49.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  53. Feb 17 03:50:49.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  54. Feb 17 03:50:49.000 [info] init_keys(): Reading/making identity key "/var/lib/tor/keys/secret_id_key"...
  55. Feb 17 03:50:49.000 [info] init_key_from_file(): No key found in "/var/lib/tor/keys/secret_id_key"; generating fresh key.
  56. Feb 17 03:50:50.000 [info] init_key_from_file(): Generated key seems valid
  57. Feb 17 03:50:50.000 [notice] You are running a new relay. Thanks for helping the Tor network! If you wish to know what will happen in the upcoming weeks regarding its usage, have a look at https://blog.torproject.org/blog/lifecycle-of-a-new-relay
  58. Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_signing_secret_key": No such file or directory
  59. Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_signing_public_key": No such file or directory
  60. Feb 17 03:50:50.000 [info] No key found in /var/lib/tor/keys/ed25519_signing_secret_key.
  61. Feb 17 03:50:50.000 [notice] It looks like I need to generate and sign a new medium-term signing key, because I don't have one. To do that, I need to load (or create) the permanent master identity key.
  62. Feb 17 03:50:50.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  63. Feb 17 03:50:50.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  64. Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_master_id_secret_key": No such file or directory
  65. Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_master_id_public_key": No such file or directory
  66. Feb 17 03:50:50.000 [info] init_keys(): Reading/making onion key "/var/lib/tor/keys/secret_onion_key"...
  67. Feb 17 03:50:50.000 [info] init_key_from_file(): No key found in "/var/lib/tor/keys/secret_onion_key"; generating fresh key.
  68. Feb 17 03:50:51.000 [info] init_key_from_file(): Generated key seems valid
  69. Feb 17 03:50:51.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: set onion key
  70. Feb 17 03:50:51.000 [info] init_curve25519_keypair_from_file(): No key found in "/var/lib/tor/keys/secret_onion_key_ntor"; generating fresh key.
  71. Feb 17 03:50:54.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  72. Feb 17 03:50:54.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  73. Feb 17 03:50:54.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  74. Feb 17 03:50:54.000 [info] router_write_fingerprint(): Dumping fingerprint to "/var/lib/tor/fingerprint"...
  75. Feb 17 03:50:54.000 [notice] Your Tor server's identity key fingerprint is 'RoteServerPaul C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5'
  76. Feb 17 03:50:54.000 [notice] Bootstrapped 0%: Starting
  77. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A
  78. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
  79. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dannenberg with signing key E66AE3C828CCAA8A765620B2750DD6257C9A52D4
  80. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority gabelmoo with signing key 5D593E8FD0BCC5C0DA732B91FC0E5E1AFEC0141D
  81. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority tor26 with signing key 6AEC757516B142855BCE29708EBDA965AC3DD06A
  82. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority maatuska with signing key C9C96501FD35732C45C424B74CC32739991B1F51
  83. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1
  84. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority Faravahar with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC
  85. Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
  86. Feb 17 03:50:56.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
  87. Feb 17 03:50:56.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live ns consensus will be the most recent until 2018-02-17 04:00:00 and will expire at 2018-02-17 06:00:00; fetching the next one at 2018-02-17 04:07:13.
  88. Feb 17 03:50:56.000 [info] update_consensus_networkstatus_fetch_time_impl(): No live microdesc consensus; we should fetch one immediately.
  89. Feb 17 03:50:56.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
  90. Feb 17 03:50:58.000 [info] read_file_to_str(): Could not open "/var/lib/tor/unverified-consensus": No such file or directory
  91. Feb 17 03:50:59.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
  92. Feb 17 03:51:01.000 [info] read_file_to_str(): Could not open "/var/lib/tor/unverified-microdesc-consensus": No such file or directory
  93. Feb 17 03:51:01.000 [info] routers_update_all_from_networkstatus(): The directory authorities say my version is ok.
  94. Feb 17 03:51:07.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 12601 descriptors.
  95. Feb 17 03:51:07.000 [info] microdesc_cache_clean(): Removed 1131/12601 microdescriptors as old.
  96. Feb 17 03:55:35.000 [info] router_load_routers_from_string(): 20066 elements to add
  97. Feb 17 03:55:38.000 [info] routerlist_remove_old_routers(): We have 871 live routers and 19159 old router descriptors.
  98. Feb 17 03:55:38.000 [info] tor_mmap_file(): Could not open "/var/lib/tor/cached-extrainfo" for mmap(): No such file or directory
  99. Feb 17 03:55:38.000 [notice] Bootstrapped 45%: Asking for relay descriptors
  100. Feb 17 03:55:38.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
  101. Feb 17 03:55:38.000 [info] update_consensus_router_descriptor_downloads(): 5126 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  102. Feb 17 03:55:38.000 [info] launch_descriptor_downloads(): Launching 54 requests for 5126 routerdescs, 96 at a time
  103. Feb 17 03:55:38.000 [info] launch_descriptor_downloads(): Launching 3 requests for 37 microdescs, 13 at a time
  104. Feb 17 03:55:38.000 [notice] Signaled readiness to systemd
  105. Feb 17 03:55:38.000 [info] channel_register(): Channel 0x36f5938 (global ID 1) in state opening (1) registered with no identity digest
  106. Feb 17 03:55:39.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
  107. Feb 17 03:55:39.000 [info] routerlist_remove_old_routers(): We have 871 live routers and 14259 old router descriptors.
  108. Feb 17 03:55:39.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
  109. Feb 17 03:55:39.000 [info] directory_send_command(): Downloading consensus from 204.13.164.118 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
  110. Feb 17 03:55:39.000 [notice] Opening Socks listener on /var/run/tor/socks
  111. Feb 17 03:55:39.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  112. Feb 17 03:55:39.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  113. Feb 17 03:55:39.000 [notice] Opening Control listener on /var/run/tor/control
  114. Feb 17 03:55:39.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
  115. Feb 17 03:55:39.000 [info] channel_register(): Channel 0x47b03d0 (global ID 2) in state opening (1) registered with no identity digest
  116. Feb 17 03:55:39.000 [info] channel_register(): Channel 0x522b038 (global ID 3) in state opening (1) registered with no identity digest
  117. Feb 17 03:55:39.000 [info] channel_register(): Channel 0x2d4a3e0 (global ID 4) in state opening (1) registered with no identity digest
  118. Feb 17 03:55:39.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  119. Feb 17 03:55:39.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  120. Feb 17 03:55:39.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  121. Feb 17 03:55:39.000 [notice] Guessed our IP address as 92.75.246.198 (source: 86.59.21.38).
  122. Feb 17 03:55:39.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: IP address changed
  123. Feb 17 03:55:39.000 [info] connection_dir_client_reached_eof(): Received answer to microdescriptor request (status 200, size 5000) from server '86.59.21.38:80'
  124. Feb 17 03:55:40.000 [notice] Bootstrapped 50%: Loading relay descriptors
  125. Feb 17 03:55:40.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
  126. Feb 17 03:55:40.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
  127. Feb 17 03:55:40.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:37485; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  128. Feb 17 03:55:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  129. Feb 17 03:55:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  130. Feb 17 03:55:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  131. Feb 17 03:55:40.000 [info] router_rebuild_descriptor(): Rebuilding relay descriptor
  132. Feb 17 03:55:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  133. Feb 17 03:55:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  134. Feb 17 03:55:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  135. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  136. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  137. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  138. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  139. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  140. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  141. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  142. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  143. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  144. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  145. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  146. Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  147. Feb 17 03:55:40.000 [info] extrainfo_dump_to_string(): Adding stats to extra-info descriptor.
  148. Feb 17 03:55:40.000 [info] or_state_save(): Saved state to "/var/lib/tor/state"
  149. Feb 17 03:55:40.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:49201; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  150. Feb 17 03:55:40.000 [info] Received http status code 304 ("Not modified") from server '204.13.164.118:80' while fetching consensus directory.
  151. Feb 17 03:55:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  152. Feb 17 03:55:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  153. Feb 17 03:55:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  154. Feb 17 03:55:40.000 [info] connection_dir_client_reached_eof(): Received answer to microdescriptor request (status 200, size 5596) from server '204.13.164.118:80'
  155. Feb 17 03:55:41.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
  156. Feb 17 03:55:41.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
  157. Feb 17 03:55:41.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  158. Feb 17 03:55:41.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  159. Feb 17 03:55:41.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  160. Feb 17 03:55:41.000 [info] connection_dir_client_reached_eof(): Received answer to microdescriptor request (status 200, size 5564) from server '128.31.0.34:9131'
  161. Feb 17 03:55:41.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
  162. Feb 17 03:55:41.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
  163. Feb 17 03:55:41.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:48444; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  164. Feb 17 03:55:41.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:39484; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  165. Feb 17 03:55:41.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  166. Feb 17 03:55:41.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  167. Feb 17 03:55:41.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  168. Feb 17 03:55:41.000 [info] connection_dir_client_reached_eof(): Received server info (size 89694) from server '128.31.0.34:9131'
  169. Feb 17 03:55:42.000 [info] router_load_routers_from_string(): 38 elements to add
  170. Feb 17 03:55:42.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 907/5979, and can only build 0% of likely paths. (We have 15% of guards bw, 14% of midpoint bw, and 13% of exit bw = 0% of path bw.)
  171. Feb 17 03:55:42.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 909 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5088 in progress.
  172. Feb 17 03:55:42.000 [info] connection_dir_client_reached_eof(): Received 38/38 router descriptors requested from 128.31.0.34:9131
  173. Feb 17 03:55:42.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  174. Feb 17 03:55:42.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  175. Feb 17 03:55:42.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  176. Feb 17 03:55:42.000 [info] connection_dir_client_reached_eof(): Received server info (size 226224) from server '86.59.21.38:80'
  177. Feb 17 03:55:44.000 [info] router_load_routers_from_string(): 95 elements to add
  178. Feb 17 03:55:44.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1002/5979, and can only build 0% of likely paths. (We have 17% of guards bw, 16% of midpoint bw, and 13% of exit bw = 0% of path bw.)
  179. Feb 17 03:55:44.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 1004 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4993 in progress.
  180. Feb 17 03:55:44.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 86.59.21.38:80
  181. Feb 17 03:55:44.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  182. Feb 17 03:55:44.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  183. Feb 17 03:55:44.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  184. Feb 17 03:55:44.000 [info] connection_dir_client_reached_eof(): Received server info (size 220634) from server '193.23.244.244:80'
  185. Feb 17 03:55:45.000 [info] router_load_routers_from_string(): 96 elements to add
  186. Feb 17 03:55:45.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
  187. Feb 17 03:55:46.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1096/5979, and can only build 0% of likely paths. (We have 18% of guards bw, 17% of midpoint bw, and 14% of exit bw = 0% of path bw.)
  188. Feb 17 03:55:46.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 1 delayed; 1099 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4897 in progress.
  189. Feb 17 03:55:46.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 193.23.244.244:80
  190. Feb 17 03:55:46.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  191. Feb 17 03:55:46.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  192. Feb 17 03:55:46.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  193. Feb 17 03:55:46.000 [info] connection_dir_client_reached_eof(): Received server info (size 220125) from server '199.58.81.140:80'
  194. Feb 17 03:55:47.000 [info] router_load_routers_from_string(): 96 elements to add
  195. Feb 17 03:55:48.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1192/5979, and can only build 0% of likely paths. (We have 20% of guards bw, 19% of midpoint bw, and 15% of exit bw = 0% of path bw.)
  196. Feb 17 03:55:48.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 0 delayed; 1195 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4800 in progress.
  197. Feb 17 03:55:48.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 199.58.81.140:80
  198. Feb 17 03:55:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  199. Feb 17 03:55:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  200. Feb 17 03:55:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  201. Feb 17 03:55:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 218305) from server '194.109.206.212:80'
  202. Feb 17 03:55:49.000 [info] router_load_routers_from_string(): 96 elements to add
  203. Feb 17 03:55:49.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1287/5979, and can only build 0% of likely paths. (We have 21% of guards bw, 20% of midpoint bw, and 16% of exit bw = 0% of path bw.)
  204. Feb 17 03:55:49.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 0 delayed; 1291 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4704 in progress.
  205. Feb 17 03:55:49.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 194.109.206.212:80
  206. Feb 17 03:55:49.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  207. Feb 17 03:55:49.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  208. Feb 17 03:55:49.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  209. Feb 17 03:55:49.000 [info] connection_dir_client_reached_eof(): Received server info (size 214849) from server '128.31.0.34:9131'
  210. Feb 17 03:55:51.000 [info] router_load_routers_from_string(): 95 elements to add
  211. Feb 17 03:55:51.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1382/5979, and can only build 0% of likely paths. (We have 23% of guards bw, 22% of midpoint bw, and 17% of exit bw = 0% of path bw.)
  212. Feb 17 03:55:51.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 0 delayed; 1386 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4609 in progress.
  213. Feb 17 03:55:51.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
  214. Feb 17 03:55:51.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  215. Feb 17 03:55:51.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  216. Feb 17 03:55:51.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  217. Feb 17 03:55:51.000 [info] connection_dir_client_reached_eof(): Received server info (size 222739) from server '128.31.0.34:9131'
  218. Feb 17 03:55:52.000 [info] router_load_routers_from_string(): 96 elements to add
  219. Feb 17 03:55:53.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1478/5979, and can only build 1% of likely paths. (We have 25% of guards bw, 23% of midpoint bw, and 18% of exit bw = 1% of path bw.)
  220. Feb 17 03:55:53.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 1 delayed; 1482 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4512 in progress.
  221. Feb 17 03:55:53.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  222. Feb 17 03:55:53.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  223. Feb 17 03:55:53.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  224. Feb 17 03:55:53.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  225. Feb 17 03:55:53.000 [info] connection_dir_client_reached_eof(): Received server info (size 223163) from server '128.31.0.34:9131'
  226. Feb 17 03:55:54.000 [info] router_load_routers_from_string(): 96 elements to add
  227. Feb 17 03:55:54.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1574/5979, and can only build 1% of likely paths. (We have 26% of guards bw, 24% of midpoint bw, and 22% of exit bw = 1% of path bw.)
  228. Feb 17 03:55:54.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1578 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4416 in progress.
  229. Feb 17 03:55:54.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  230. Feb 17 03:55:54.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  231. Feb 17 03:55:54.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  232. Feb 17 03:55:54.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  233. Feb 17 03:55:54.000 [info] connection_dir_client_reached_eof(): Received server info (size 222845) from server '128.31.0.34:9131'
  234. Feb 17 03:55:56.000 [info] router_load_routers_from_string(): 96 elements to add
  235. Feb 17 03:55:56.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1670/5979, and can only build 1% of likely paths. (We have 27% of guards bw, 26% of midpoint bw, and 24% of exit bw = 1% of path bw.)
  236. Feb 17 03:55:56.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1674 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4320 in progress.
  237. Feb 17 03:55:56.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  238. Feb 17 03:55:56.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  239. Feb 17 03:55:56.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  240. Feb 17 03:55:56.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  241. Feb 17 03:55:56.000 [info] connection_dir_client_reached_eof(): Received server info (size 223348) from server '128.31.0.34:9131'
  242. Feb 17 03:55:57.000 [info] router_load_routers_from_string(): 96 elements to add
  243. Feb 17 03:55:58.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1766/5979, and can only build 1% of likely paths. (We have 28% of guards bw, 27% of midpoint bw, and 25% of exit bw = 1% of path bw.)
  244. Feb 17 03:55:58.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1770 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4224 in progress.
  245. Feb 17 03:55:58.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  246. Feb 17 03:55:58.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  247. Feb 17 03:55:58.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  248. Feb 17 03:55:58.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  249. Feb 17 03:55:58.000 [info] connection_dir_client_reached_eof(): Received server info (size 224058) from server '128.31.0.34:9131'
  250. Feb 17 03:55:59.000 [info] router_load_routers_from_string(): 96 elements to add
  251. Feb 17 03:55:59.000 [info] Bootstrapped 51%: Loading relay descriptors
  252. Feb 17 03:55:59.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1862/5979, and can only build 2% of likely paths. (We have 29% of guards bw, 29% of midpoint bw, and 26% of exit bw = 2% of path bw.)
  253. Feb 17 03:56:00.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1866 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4128 in progress.
  254. Feb 17 03:56:00.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  255. Feb 17 03:56:00.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  256. Feb 17 03:56:00.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  257. Feb 17 03:56:00.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  258. Feb 17 03:56:00.000 [info] connection_dir_client_reached_eof(): Received server info (size 221118) from server '128.31.0.34:9131'
  259. Feb 17 03:56:01.000 [info] router_load_routers_from_string(): 96 elements to add
  260. Feb 17 03:56:01.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1958/5979, and can only build 2% of likely paths. (We have 32% of guards bw, 31% of midpoint bw, and 27% of exit bw = 2% of path bw.)
  261. Feb 17 03:56:01.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1962 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4032 in progress.
  262. Feb 17 03:56:01.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  263. Feb 17 03:56:01.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  264. Feb 17 03:56:01.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  265. Feb 17 03:56:01.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  266. Feb 17 03:56:01.000 [info] connection_dir_client_reached_eof(): Received server info (size 226035) from server '128.31.0.34:9131'
  267. Feb 17 03:56:03.000 [info] router_load_routers_from_string(): 96 elements to add
  268. Feb 17 03:56:03.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2054/5979, and can only build 3% of likely paths. (We have 34% of guards bw, 32% of midpoint bw, and 27% of exit bw = 3% of path bw.)
  269. Feb 17 03:56:03.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2058 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3936 in progress.
  270. Feb 17 03:56:03.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  271. Feb 17 03:56:03.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  272. Feb 17 03:56:03.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  273. Feb 17 03:56:03.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  274. Feb 17 03:56:03.000 [info] connection_dir_client_reached_eof(): Received server info (size 220748) from server '128.31.0.34:9131'
  275. Feb 17 03:56:04.000 [info] router_load_routers_from_string(): 96 elements to add
  276. Feb 17 03:56:05.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2150/5979, and can only build 3% of likely paths. (We have 35% of guards bw, 33% of midpoint bw, and 28% of exit bw = 3% of path bw.)
  277. Feb 17 03:56:05.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2154 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3840 in progress.
  278. Feb 17 03:56:05.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  279. Feb 17 03:56:05.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  280. Feb 17 03:56:05.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  281. Feb 17 03:56:05.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  282. Feb 17 03:56:05.000 [info] connection_dir_client_reached_eof(): Received server info (size 230508) from server '171.25.193.9:443'
  283. Feb 17 03:56:06.000 [info] router_load_routers_from_string(): 96 elements to add
  284. Feb 17 03:56:06.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2245/5979, and can only build 4% of likely paths. (We have 37% of guards bw, 34% of midpoint bw, and 31% of exit bw = 4% of path bw.)
  285. Feb 17 03:56:06.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2250 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3744 in progress.
  286. Feb 17 03:56:06.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 171.25.193.9:443
  287. Feb 17 03:56:06.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  288. Feb 17 03:56:06.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  289. Feb 17 03:56:06.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  290. Feb 17 03:56:06.000 [info] connection_dir_client_reached_eof(): Received server info (size 229945) from server '131.188.40.189:80'
  291. Feb 17 03:56:08.000 [info] router_load_routers_from_string(): 96 elements to add
  292. Feb 17 03:56:08.000 [info] Bootstrapped 52%: Loading relay descriptors
  293. Feb 17 03:56:08.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2340/5979, and can only build 4% of likely paths. (We have 39% of guards bw, 37% of midpoint bw, and 32% of exit bw = 4% of path bw.)
  294. Feb 17 03:56:08.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2346 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3648 in progress.
  295. Feb 17 03:56:08.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 131.188.40.189:80
  296. Feb 17 03:56:08.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  297. Feb 17 03:56:08.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  298. Feb 17 03:56:08.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  299. Feb 17 03:56:08.000 [info] connection_dir_client_reached_eof(): Received server info (size 240653) from server '128.31.0.34:9131'
  300. Feb 17 03:56:10.000 [info] router_load_routers_from_string(): 96 elements to add
  301. Feb 17 03:56:10.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2436/5979, and can only build 5% of likely paths. (We have 40% of guards bw, 39% of midpoint bw, and 33% of exit bw = 5% of path bw.)
  302. Feb 17 03:56:10.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2442 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3552 in progress.
  303. Feb 17 03:56:10.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  304. Feb 17 03:56:10.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  305. Feb 17 03:56:10.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  306. Feb 17 03:56:10.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  307. Feb 17 03:56:10.000 [info] connection_dir_client_reached_eof(): Received server info (size 228672) from server '154.35.175.225:80'
  308. Feb 17 03:56:11.000 [info] router_load_routers_from_string(): 96 elements to add
  309. Feb 17 03:56:12.000 [info] Bootstrapped 53%: Loading relay descriptors
  310. Feb 17 03:56:12.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2532/5979, and can only build 6% of likely paths. (We have 42% of guards bw, 41% of midpoint bw, and 35% of exit bw = 6% of path bw.)
  311. Feb 17 03:56:12.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2538 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3456 in progress.
  312. Feb 17 03:56:12.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 154.35.175.225:80
  313. Feb 17 03:56:12.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  314. Feb 17 03:56:12.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  315. Feb 17 03:56:12.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  316. Feb 17 03:56:12.000 [info] connection_dir_client_reached_eof(): Received server info (size 230989) from server '128.31.0.34:9131'
  317. Feb 17 03:56:14.000 [info] router_load_routers_from_string(): 96 elements to add
  318. Feb 17 03:56:14.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2628/5979, and can only build 7% of likely paths. (We have 45% of guards bw, 43% of midpoint bw, and 36% of exit bw = 7% of path bw.)
  319. Feb 17 03:56:14.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2634 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3360 in progress.
  320. Feb 17 03:56:14.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  321. Feb 17 03:56:14.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  322. Feb 17 03:56:14.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  323. Feb 17 03:56:14.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  324. Feb 17 03:56:14.000 [info] connection_dir_client_reached_eof(): Received server info (size 238447) from server '128.31.0.34:9131'
  325. Feb 17 03:56:16.000 [info] router_load_routers_from_string(): 96 elements to add
  326. Feb 17 03:56:16.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2724/5979, and can only build 7% of likely paths. (We have 47% of guards bw, 45% of midpoint bw, and 36% of exit bw = 7% of path bw.)
  327. Feb 17 03:56:16.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2730 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3264 in progress.
  328. Feb 17 03:56:16.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  329. Feb 17 03:56:16.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  330. Feb 17 03:56:16.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  331. Feb 17 03:56:16.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  332. Feb 17 03:56:16.000 [info] connection_dir_client_reached_eof(): Received server info (size 228170) from server '128.31.0.34:9131'
  333. Feb 17 03:56:17.000 [info] router_load_routers_from_string(): 96 elements to add
  334. Feb 17 03:56:18.000 [info] Bootstrapped 54%: Loading relay descriptors
  335. Feb 17 03:56:18.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2820/5979, and can only build 8% of likely paths. (We have 48% of guards bw, 47% of midpoint bw, and 37% of exit bw = 8% of path bw.)
  336. Feb 17 03:56:18.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2826 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3168 in progress.
  337. Feb 17 03:56:18.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  338. Feb 17 03:56:18.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  339. Feb 17 03:56:18.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  340. Feb 17 03:56:18.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  341. Feb 17 03:56:18.000 [info] connection_dir_client_reached_eof(): Received server info (size 238773) from server '128.31.0.34:9131'
  342. Feb 17 03:56:19.000 [info] router_load_routers_from_string(): 96 elements to add
  343. Feb 17 03:56:20.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2915/5979, and can only build 9% of likely paths. (We have 50% of guards bw, 48% of midpoint bw, and 40% of exit bw = 9% of path bw.)
  344. Feb 17 03:56:20.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2922 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3072 in progress.
  345. Feb 17 03:56:20.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  346. Feb 17 03:56:20.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  347. Feb 17 03:56:20.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  348. Feb 17 03:56:20.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  349. Feb 17 03:56:20.000 [info] connection_dir_client_reached_eof(): Received server info (size 231436) from server '128.31.0.34:9131'
  350. Feb 17 03:56:21.000 [info] router_load_routers_from_string(): 96 elements to add
  351. Feb 17 03:56:21.000 [notice] Bootstrapped 55%: Loading relay descriptors
  352. Feb 17 03:56:21.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3011/5979, and can only build 10% of likely paths. (We have 51% of guards bw, 50% of midpoint bw, and 41% of exit bw = 10% of path bw.)
  353. Feb 17 03:56:21.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 3018 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2976 in progress.
  354. Feb 17 03:56:21.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  355. Feb 17 03:56:21.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  356. Feb 17 03:56:21.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  357. Feb 17 03:56:21.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  358. Feb 17 03:56:21.000 [info] connection_dir_client_reached_eof(): Received server info (size 236704) from server '128.31.0.34:9131'
  359. Feb 17 03:56:23.000 [info] router_load_routers_from_string(): 95 elements to add
  360. Feb 17 03:56:23.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3106/5979, and can only build 12% of likely paths. (We have 53% of guards bw, 52% of midpoint bw, and 43% of exit bw = 12% of path bw.)
  361. Feb 17 03:56:23.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 3113 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2881 in progress.
  362. Feb 17 03:56:23.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
  363. Feb 17 03:56:23.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 1 delayed; 3113 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2880 in progress.
  364. Feb 17 03:56:23.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  365. Feb 17 03:56:23.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  366. Feb 17 03:56:23.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  367. Feb 17 03:56:23.000 [info] connection_dir_client_reached_eof(): Received server info (size 227787) from server '128.31.0.34:9131'
  368. Feb 17 03:56:25.000 [info] router_load_routers_from_string(): 95 elements to add
  369. Feb 17 03:56:25.000 [info] Bootstrapped 56%: Loading relay descriptors
  370. Feb 17 03:56:25.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3201/5979, and can only build 13% of likely paths. (We have 54% of guards bw, 53% of midpoint bw, and 46% of exit bw = 13% of path bw.)
  371. Feb 17 03:56:25.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 1 delayed; 3208 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2785 in progress.
  372. Feb 17 03:56:25.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
  373. Feb 17 03:56:25.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  374. Feb 17 03:56:25.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  375. Feb 17 03:56:25.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  376. Feb 17 03:56:25.000 [info] connection_dir_client_reached_eof(): Received server info (size 227240) from server '128.31.0.34:9131'
  377. Feb 17 03:56:26.000 [info] router_load_routers_from_string(): 95 elements to add
  378. Feb 17 03:56:27.000 [info] Bootstrapped 57%: Loading relay descriptors
  379. Feb 17 03:56:27.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3295/5979, and can only build 14% of likely paths. (We have 56% of guards bw, 54% of midpoint bw, and 48% of exit bw = 14% of path bw.)
  380. Feb 17 03:56:27.000 [info] update_consensus_router_descriptor_downloads(): 4 router descriptors downloadable. 1 delayed; 3303 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2689 in progress.
  381. Feb 17 03:56:27.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
  382. Feb 17 03:56:27.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  383. Feb 17 03:56:27.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  384. Feb 17 03:56:27.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  385. Feb 17 03:56:27.000 [info] connection_dir_client_reached_eof(): Received server info (size 238099) from server '128.31.0.34:9131'
  386. Feb 17 03:56:28.000 [info] router_load_routers_from_string(): 96 elements to add
  387. Feb 17 03:56:28.000 [info] Bootstrapped 58%: Loading relay descriptors
  388. Feb 17 03:56:28.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3391/5979, and can only build 16% of likely paths. (We have 57% of guards bw, 56% of midpoint bw, and 50% of exit bw = 16% of path bw.)
  389. Feb 17 03:56:28.000 [info] update_consensus_router_descriptor_downloads(): 5 router descriptors downloadable. 1 delayed; 3399 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2592 in progress.
  390. Feb 17 03:56:28.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  391. Feb 17 03:56:28.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  392. Feb 17 03:56:28.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  393. Feb 17 03:56:28.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  394. Feb 17 03:56:28.000 [info] connection_dir_client_reached_eof(): Received server info (size 241625) from server '128.31.0.34:9131'
  395. Feb 17 03:56:30.000 [info] router_load_routers_from_string(): 96 elements to add
  396. Feb 17 03:56:30.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3487/5979, and can only build 18% of likely paths. (We have 59% of guards bw, 58% of midpoint bw, and 53% of exit bw = 18% of path bw.)
  397. Feb 17 03:56:30.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3495 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2496 in progress.
  398. Feb 17 03:56:30.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  399. Feb 17 03:56:30.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  400. Feb 17 03:56:30.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  401. Feb 17 03:56:30.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  402. Feb 17 03:56:30.000 [info] connection_dir_client_reached_eof(): Received server info (size 214045) from server '128.31.0.34:9131'
  403. Feb 17 03:56:31.000 [info] router_load_routers_from_string(): 96 elements to add
  404. Feb 17 03:56:32.000 [info] Bootstrapped 59%: Loading relay descriptors
  405. Feb 17 03:56:32.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3583/5979, and can only build 20% of likely paths. (We have 61% of guards bw, 59% of midpoint bw, and 56% of exit bw = 20% of path bw.)
  406. Feb 17 03:56:32.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3591 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2400 in progress.
  407. Feb 17 03:56:32.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  408. Feb 17 03:56:32.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  409. Feb 17 03:56:32.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  410. Feb 17 03:56:32.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  411. Feb 17 03:56:32.000 [info] connection_dir_client_reached_eof(): Received server info (size 218820) from server '128.31.0.34:9131'
  412. Feb 17 03:56:33.000 [info] router_load_routers_from_string(): 96 elements to add
  413. Feb 17 03:56:33.000 [notice] Bootstrapped 61%: Loading relay descriptors
  414. Feb 17 03:56:33.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3678/5979, and can only build 22% of likely paths. (We have 62% of guards bw, 60% of midpoint bw, and 59% of exit bw = 22% of path bw.)
  415. Feb 17 03:56:34.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3687 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2304 in progress.
  416. Feb 17 03:56:34.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  417. Feb 17 03:56:34.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  418. Feb 17 03:56:34.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  419. Feb 17 03:56:34.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  420. Feb 17 03:56:34.000 [info] connection_dir_client_reached_eof(): Received server info (size 221871) from server '128.31.0.34:9131'
  421. Feb 17 03:56:35.000 [info] router_load_routers_from_string(): 96 elements to add
  422. Feb 17 03:56:35.000 [info] Bootstrapped 62%: Loading relay descriptors
  423. Feb 17 03:56:35.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3774/5979, and can only build 24% of likely paths. (We have 64% of guards bw, 62% of midpoint bw, and 61% of exit bw = 24% of path bw.)
  424. Feb 17 03:56:35.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3783 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2208 in progress.
  425. Feb 17 03:56:35.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  426. Feb 17 03:56:35.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  427. Feb 17 03:56:35.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  428. Feb 17 03:56:35.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  429. Feb 17 03:56:35.000 [info] connection_dir_client_reached_eof(): Received server info (size 219844) from server '128.31.0.34:9131'
  430. Feb 17 03:56:36.000 [info] router_load_routers_from_string(): 96 elements to add
  431. Feb 17 03:56:37.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3870/5979, and can only build 25% of likely paths. (We have 65% of guards bw, 64% of midpoint bw, and 61% of exit bw = 25% of path bw.)
  432. Feb 17 03:56:37.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3879 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2112 in progress.
  433. Feb 17 03:56:37.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  434. Feb 17 03:56:37.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  435. Feb 17 03:56:37.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  436. Feb 17 03:56:37.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  437. Feb 17 03:56:37.000 [info] connection_dir_client_reached_eof(): Received server info (size 219193) from server '128.31.0.34:9131'
  438. Feb 17 03:56:38.000 [info] router_load_routers_from_string(): 96 elements to add
  439. Feb 17 03:56:38.000 [info] Bootstrapped 63%: Loading relay descriptors
  440. Feb 17 03:56:39.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3966/5979, and can only build 28% of likely paths. (We have 68% of guards bw, 66% of midpoint bw, and 62% of exit bw = 28% of path bw.)
  441. Feb 17 03:56:39.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3975 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2016 in progress.
  442. Feb 17 03:56:39.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  443. Feb 17 03:56:39.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  444. Feb 17 03:56:39.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  445. Feb 17 03:56:39.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  446. Feb 17 03:56:39.000 [info] connection_dir_client_reached_eof(): Received server info (size 216940) from server '128.31.0.34:9131'
  447. Feb 17 03:56:40.000 [info] router_load_routers_from_string(): 96 elements to add
  448. Feb 17 03:56:40.000 [info] Bootstrapped 64%: Loading relay descriptors
  449. Feb 17 03:56:40.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4062/5979, and can only build 30% of likely paths. (We have 69% of guards bw, 68% of midpoint bw, and 64% of exit bw = 30% of path bw.)
  450. Feb 17 03:56:40.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4071 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1920 in progress.
  451. Feb 17 03:56:40.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  452. Feb 17 03:56:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  453. Feb 17 03:56:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  454. Feb 17 03:56:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  455. Feb 17 03:56:40.000 [info] connection_dir_client_reached_eof(): Received server info (size 229469) from server '128.31.0.34:9131'
  456. Feb 17 03:56:42.000 [info] router_load_routers_from_string(): 96 elements to add
  457. Feb 17 03:56:42.000 [info] Bootstrapped 65%: Loading relay descriptors
  458. Feb 17 03:56:42.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4157/5979, and can only build 32% of likely paths. (We have 71% of guards bw, 69% of midpoint bw, and 65% of exit bw = 32% of path bw.)
  459. Feb 17 03:56:42.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4167 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1824 in progress.
  460. Feb 17 03:56:42.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  461. Feb 17 03:56:42.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  462. Feb 17 03:56:42.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  463. Feb 17 03:56:42.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  464. Feb 17 03:56:42.000 [info] connection_dir_client_reached_eof(): Received server info (size 218968) from server '128.31.0.34:9131'
  465. Feb 17 03:56:43.000 [info] router_load_routers_from_string(): 96 elements to add
  466. Feb 17 03:56:44.000 [notice] Bootstrapped 66%: Loading relay descriptors
  467. Feb 17 03:56:44.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4252/5979, and can only build 34% of likely paths. (We have 72% of guards bw, 70% of midpoint bw, and 67% of exit bw = 34% of path bw.)
  468. Feb 17 03:56:44.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4263 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1728 in progress.
  469. Feb 17 03:56:44.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  470. Feb 17 03:56:44.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  471. Feb 17 03:56:44.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  472. Feb 17 03:56:44.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  473. Feb 17 03:56:44.000 [info] connection_dir_client_reached_eof(): Received server info (size 220465) from server '128.31.0.34:9131'
  474. Feb 17 03:56:45.000 [info] router_load_routers_from_string(): 96 elements to add
  475. Feb 17 03:56:45.000 [info] Bootstrapped 67%: Loading relay descriptors
  476. Feb 17 03:56:45.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4348/5979, and can only build 36% of likely paths. (We have 74% of guards bw, 72% of midpoint bw, and 68% of exit bw = 36% of path bw.)
  477. Feb 17 03:56:45.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4359 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1632 in progress.
  478. Feb 17 03:56:45.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  479. Feb 17 03:56:45.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  480. Feb 17 03:56:45.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  481. Feb 17 03:56:45.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  482. Feb 17 03:56:45.000 [info] connection_dir_client_reached_eof(): Received server info (size 218379) from server '128.31.0.34:9131'
  483. Feb 17 03:56:47.000 [info] router_load_routers_from_string(): 96 elements to add
  484. Feb 17 03:56:47.000 [info] Bootstrapped 68%: Loading relay descriptors
  485. Feb 17 03:56:47.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4442/5979, and can only build 39% of likely paths. (We have 75% of guards bw, 73% of midpoint bw, and 70% of exit bw = 39% of path bw.)
  486. Feb 17 03:56:47.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4455 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1536 in progress.
  487. Feb 17 03:56:47.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  488. Feb 17 03:56:47.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4455 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1536 in progress.
  489. Feb 17 03:56:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  490. Feb 17 03:56:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  491. Feb 17 03:56:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  492. Feb 17 03:56:47.000 [info] connection_dir_client_reached_eof(): Received server info (size 258814) from server '128.31.0.34:9131'
  493. Feb 17 03:56:50.000 [info] router_load_routers_from_string(): 96 elements to add
  494. Feb 17 03:56:50.000 [info] Bootstrapped 70%: Loading relay descriptors
  495. Feb 17 03:56:50.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4538/5979, and can only build 43% of likely paths. (We have 76% of guards bw, 74% of midpoint bw, and 75% of exit bw = 43% of path bw.)
  496. Feb 17 03:56:50.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4551 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1440 in progress.
  497. Feb 17 03:56:50.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  498. Feb 17 03:56:50.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  499. Feb 17 03:56:50.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  500. Feb 17 03:56:50.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  501. Feb 17 03:56:50.000 [info] connection_dir_client_reached_eof(): Received server info (size 227300) from server '128.31.0.34:9131'
  502. Feb 17 03:56:52.000 [info] router_load_routers_from_string(): 96 elements to add
  503. Feb 17 03:56:52.000 [notice] Bootstrapped 72%: Loading relay descriptors
  504. Feb 17 03:56:52.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4634/5979, and can only build 45% of likely paths. (We have 78% of guards bw, 76% of midpoint bw, and 76% of exit bw = 45% of path bw.)
  505. Feb 17 03:56:52.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4647 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1344 in progress.
  506. Feb 17 03:56:52.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  507. Feb 17 03:56:52.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  508. Feb 17 03:56:52.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  509. Feb 17 03:56:52.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  510. Feb 17 03:56:52.000 [info] connection_dir_client_reached_eof(): Received server info (size 230470) from server '128.31.0.34:9131'
  511. Feb 17 03:56:53.000 [info] router_load_routers_from_string(): 96 elements to add
  512. Feb 17 03:56:54.000 [info] Bootstrapped 73%: Loading relay descriptors
  513. Feb 17 03:56:54.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4730/5979, and can only build 48% of likely paths. (We have 79% of guards bw, 78% of midpoint bw, and 78% of exit bw = 48% of path bw.)
  514. Feb 17 03:56:54.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4743 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1248 in progress.
  515. Feb 17 03:56:54.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  516. Feb 17 03:56:54.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  517. Feb 17 03:56:54.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  518. Feb 17 03:56:54.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  519. Feb 17 03:56:54.000 [info] connection_dir_client_reached_eof(): Received server info (size 237877) from server '128.31.0.34:9131'
  520. Feb 17 03:56:55.000 [info] router_load_routers_from_string(): 96 elements to add
  521. Feb 17 03:56:55.000 [info] Bootstrapped 75%: Loading relay descriptors
  522. Feb 17 03:56:56.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4825/5979, and can only build 52% of likely paths. (We have 81% of guards bw, 80% of midpoint bw, and 79% of exit bw = 52% of path bw.)
  523. Feb 17 03:56:56.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4839 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1152 in progress.
  524. Feb 17 03:56:56.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  525. Feb 17 03:56:56.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  526. Feb 17 03:56:56.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  527. Feb 17 03:56:56.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  528. Feb 17 03:56:56.000 [info] connection_dir_client_reached_eof(): Received server info (size 229443) from server '128.31.0.34:9131'
  529. Feb 17 03:56:57.000 [info] router_load_routers_from_string(): 96 elements to add
  530. Feb 17 03:56:57.000 [info] Bootstrapped 76%: Loading relay descriptors
  531. Feb 17 03:56:57.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4921/5979, and can only build 55% of likely paths. (We have 83% of guards bw, 81% of midpoint bw, and 81% of exit bw = 55% of path bw.)
  532. Feb 17 03:56:57.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4935 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1056 in progress.
  533. Feb 17 03:56:57.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  534. Feb 17 03:56:57.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  535. Feb 17 03:56:57.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  536. Feb 17 03:56:57.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  537. Feb 17 03:56:57.000 [info] connection_dir_client_reached_eof(): Received server info (size 236664) from server '128.31.0.34:9131'
  538. Feb 17 03:56:59.000 [info] router_load_routers_from_string(): 96 elements to add
  539. Feb 17 03:56:59.000 [notice] Bootstrapped 78%: Loading relay descriptors
  540. Feb 17 03:56:59.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 5016/5979, and can only build 58% of likely paths. (We have 84% of guards bw, 83% of midpoint bw, and 83% of exit bw = 58% of path bw.)
  541. Feb 17 03:56:59.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 5031 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 960 in progress.
  542. Feb 17 03:56:59.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  543. Feb 17 03:56:59.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  544. Feb 17 03:56:59.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  545. Feb 17 03:56:59.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  546. Feb 17 03:56:59.000 [info] connection_dir_client_reached_eof(): Received server info (size 223052) from server '128.31.0.34:9131'
  547. Feb 17 03:57:00.000 [info] router_load_routers_from_string(): 95 elements to add
  548. Feb 17 03:57:01.000 [notice] Bootstrapped 80%: Connecting to the Tor network
  549. Feb 17 03:57:01.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
  550. Feb 17 03:57:01.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  551. Feb 17 03:57:01.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  552. Feb 17 03:57:01.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  553. Feb 17 03:57:01.000 [info] connection_dir_client_reached_eof(): Received server info (size 243565) from server '128.31.0.34:9131'
  554. Feb 17 03:57:02.000 [info] router_load_routers_from_string(): 96 elements to add
  555. Feb 17 03:57:02.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  556. Feb 17 03:57:02.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  557. Feb 17 03:57:02.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  558. Feb 17 03:57:02.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  559. Feb 17 03:57:02.000 [info] connection_dir_client_reached_eof(): Received server info (size 220271) from server '128.31.0.34:9131'
  560. Feb 17 03:57:04.000 [info] router_load_routers_from_string(): 95 elements to add
  561. Feb 17 03:57:04.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
  562. Feb 17 03:57:04.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  563. Feb 17 03:57:04.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  564. Feb 17 03:57:04.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  565. Feb 17 03:57:04.000 [info] connection_dir_client_reached_eof(): Received server info (size 226237) from server '128.31.0.34:9131'
  566. Feb 17 03:57:05.000 [info] router_load_routers_from_string(): 96 elements to add
  567. Feb 17 03:57:06.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  568. Feb 17 03:57:06.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  569. Feb 17 03:57:06.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  570. Feb 17 03:57:06.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  571. Feb 17 03:57:06.000 [info] connection_dir_client_reached_eof(): Received server info (size 216873) from server '128.31.0.34:9131'
  572. Feb 17 03:57:07.000 [info] router_load_routers_from_string(): 96 elements to add
  573. Feb 17 03:57:07.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  574. Feb 17 03:57:07.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  575. Feb 17 03:57:07.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  576. Feb 17 03:57:07.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  577. Feb 17 03:57:07.000 [info] connection_dir_client_reached_eof(): Received server info (size 223922) from server '128.31.0.34:9131'
  578. Feb 17 03:57:09.000 [info] router_load_routers_from_string(): 96 elements to add
  579. Feb 17 03:57:09.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  580. Feb 17 03:57:09.000 [info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
  581. Feb 17 03:57:09.000 [info] choose_good_exit_server_general(): Found 821 servers that might support 0/0 pending connections.
  582. Feb 17 03:57:09.000 [info] choose_good_exit_server_general(): Chose exit server '$4031460683AE9E0512D3620C2758D98758AC6C93~niftyeuropeanrabbit at 185.220.101.10'
  583. Feb 17 03:57:09.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  584. Feb 17 03:57:09.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5605 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 384 in progress.
  585. Feb 17 03:57:09.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
  586. Feb 17 03:57:09.000 [info] directory_send_command(): Downloading consensus from 62.210.90.164:9030 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
  587. Feb 17 03:57:09.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  588. Feb 17 03:57:09.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  589. Feb 17 03:57:09.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  590. Feb 17 03:57:09.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
  591. Feb 17 03:57:09.000 [info] routerlist_remove_old_routers(): We have 5605 live routers and 14259 old router descriptors.
  592. Feb 17 03:57:09.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  593. Feb 17 03:57:09.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  594. Feb 17 03:57:09.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  595. Feb 17 03:57:09.000 [info] connection_dir_client_reached_eof(): Received server info (size 236903) from server '204.13.164.118:80'
  596. Feb 17 03:57:11.000 [info] router_load_routers_from_string(): 96 elements to add
  597. Feb 17 03:57:11.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 204.13.164.118:80
  598. Feb 17 03:57:11.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  599. Feb 17 03:57:11.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  600. Feb 17 03:57:11.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  601. Feb 17 03:57:11.000 [info] connection_dir_client_reached_eof(): Received server info (size 248995) from server '128.31.0.34:9131'
  602. Feb 17 03:57:12.000 [info] router_load_routers_from_string(): 96 elements to add
  603. Feb 17 03:57:13.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  604. Feb 17 03:57:13.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  605. Feb 17 03:57:13.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  606. Feb 17 03:57:13.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  607. Feb 17 03:57:13.000 [info] connection_dir_client_reached_eof(): Received server info (size 252514) from server '128.31.0.34:9131'
  608. Feb 17 03:57:14.000 [info] router_load_routers_from_string(): 96 elements to add
  609. Feb 17 03:57:14.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  610. Feb 17 03:57:15.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  611. Feb 17 03:57:15.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  612. Feb 17 03:57:15.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  613. Feb 17 03:57:15.000 [info] connection_dir_client_reached_eof(): Received server info (size 231895) from server '128.31.0.34:9131'
  614. Feb 17 03:57:16.000 [info] router_load_routers_from_string(): 96 elements to add
  615. Feb 17 03:57:16.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
  616. Feb 17 03:57:16.000 [info] channel_register(): Channel 0x32ce318 (global ID 6) in state opening (1) registered with no identity digest
  617. Feb 17 03:57:16.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
  618. Feb 17 03:57:16.000 [info] circuit_predict_and_launch_new(): Have 1 clean circs (0 internal), need another exit circ.
  619. Feb 17 03:57:16.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  620. Feb 17 03:57:16.000 [info] choose_good_exit_server_general(): Chose exit server '$ABC95691E48C71605244E2B6A4F0BE8E79848F1B~xorox at 37.187.94.86'
  621. Feb 17 03:57:16.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Connection in progress; waiting.
  622. Feb 17 03:57:16.000 [info] circuit_predict_and_launch_new(): Have 2 clean circs (0 uptime-internal, 0 internal), need another hidden service circ.
  623. Feb 17 03:57:16.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Connection in progress; waiting.
  624. Feb 17 03:57:16.000 [info] Received http status code 304 ("Not modified") from server '62.210.90.164:9030' while fetching consensus directory.
  625. Feb 17 03:57:16.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:35874; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  626. Feb 17 03:57:16.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  627. Feb 17 03:57:16.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  628. Feb 17 03:57:16.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  629. Feb 17 03:57:16.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
  630. Feb 17 03:57:16.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  631. Feb 17 03:57:16.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  632. Feb 17 03:57:16.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  633. Feb 17 03:57:16.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is F1D71314781D23800C3C62CB720BBCF449B27399. Our address is apparently 92.75.246.198.
  634. Feb 17 03:57:17.000 [info] circuit_predict_and_launch_new(): Have 3 clean circs (1 uptime-internal, 1 internal), need another hidden service circ.
  635. Feb 17 03:57:17.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  636. Feb 17 03:57:18.000 [info] circuit_predict_and_launch_new(): Have 4 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  637. Feb 17 03:57:18.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  638. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  639. Feb 17 03:57:21.000 [info] exit circ (length 3, last hop niftyeuropeanrabbit): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $931BE618172446D534478988C01EE1CBD1874A97(closed) $4031460683AE9E0512D3620C2758D98758AC6C93(closed)
  640. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  641. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  642. Feb 17 03:57:21.000 [info] exit circ (length 3, last hop xorox): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $26E3923C96EA3F6549EB0B96157CF8B8EE21A7DC(closed) $ABC95691E48C71605244E2B6A4F0BE8E79848F1B(closed)
  643. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  644. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  645. Feb 17 03:57:21.000 [info] internal (high-uptime) circ (length 3, last hop poildortie): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $328E54981C6DDD7D89B89E418724A4A7881E3192(closed) $579B528179D182C78B503B7A0530492DEB7BAD86(closed)
  646. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  647. Feb 17 03:57:21.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 278.645508/296.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  648. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  649. Feb 17 03:57:21.000 [info] exit circ (length 3, last hop niftyeuropeanrabbit): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $931BE618172446D534478988C01EE1CBD1874A97(open) $4031460683AE9E0512D3620C2758D98758AC6C93(closed)
  650. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  651. Feb 17 03:57:21.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 278.645508/297.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  652. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  653. Feb 17 03:57:21.000 [info] internal (high-uptime) circ (length 3, last hop poildortie): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $328E54981C6DDD7D89B89E418724A4A7881E3192(open) $579B528179D182C78B503B7A0530492DEB7BAD86(closed)
  654. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  655. Feb 17 03:57:21.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 278.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  656. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  657. Feb 17 03:57:21.000 [info] exit circ (length 3, last hop xorox): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $26E3923C96EA3F6549EB0B96157CF8B8EE21A7DC(open) $ABC95691E48C71605244E2B6A4F0BE8E79848F1B(closed)
  658. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  659. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  660. Feb 17 03:57:21.000 [info] internal (high-uptime) circ (length 3, last hop poildortie): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $328E54981C6DDD7D89B89E418724A4A7881E3192(open) $579B528179D182C78B503B7A0530492DEB7BAD86(open)
  661. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
  662. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  663. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  664. Feb 17 03:57:21.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6825.836054ms, 60000.000000ms, Xm: 4737, a: 4.405667, r: 0.140000) based on 1000 circuit times
  665. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): circuit built!
  666. Feb 17 03:57:21.000 [info] pathbias_count_build_success(): Got success count 279.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  667. Feb 17 03:57:21.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
  668. Feb 17 03:57:21.000 [notice] Bootstrapped 100%: Done
  669. Feb 17 03:57:21.000 [notice] Now checking whether ORPort 92.75.246.198:9001 and DirPort 92.75.246.198:9030 are reachable... (this may take up to 20 minutes -- look for log messages indicating success)
  670. Feb 17 03:57:21.000 [info] consider_testing_reachability(): Testing reachability of my ORPort: 92.75.246.198:9001.
  671. Feb 17 03:57:21.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  672. Feb 17 03:57:21.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  673. Feb 17 03:57:21.000 [info] connection_ap_make_link(): Making internal anonymized tunnel to [scrubbed]:9030 ...
  674. Feb 17 03:57:21.000 [info] connection_ap_make_link(): ... application connection created and linked.
  675. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  676. Feb 17 03:57:21.000 [info] exit circ (length 3, last hop niftyeuropeanrabbit): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $931BE618172446D534478988C01EE1CBD1874A97(open) $4031460683AE9E0512D3620C2758D98758AC6C93(open)
  677. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
  678. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  679. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  680. Feb 17 03:57:21.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6825.836054ms, 60000.000000ms, Xm: 4737, a: 4.405667, r: 0.140000) based on 1000 circuit times
  681. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): circuit built!
  682. Feb 17 03:57:21.000 [info] pathbias_count_build_success(): Got success count 280.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  683. Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Found 215 servers that might support 1/1 pending connections.
  684. Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Chose exit server '$C793AB88565DDD3C9E4C6F15CCB9D8C7EF964CE9~ori at 85.248.227.163'
  685. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  686. Feb 17 03:57:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
  687. Feb 17 03:57:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
  688. Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  689. Feb 17 03:57:21.000 [info] exit circ (length 3, last hop xorox): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $26E3923C96EA3F6549EB0B96157CF8B8EE21A7DC(open) $ABC95691E48C71605244E2B6A4F0BE8E79848F1B(open)
  690. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
  691. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  692. Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  693. Feb 17 03:57:21.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6825.920068ms, 60000.000000ms, Xm: 4737, a: 4.405519, r: 0.140000) based on 1000 circuit times
  694. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): circuit built!
  695. Feb 17 03:57:21.000 [info] pathbias_count_build_success(): Got success count 281.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  696. Feb 17 03:57:21.000 [info] circuit_predict_and_launch_new(): Have 6 clean circs (3 internal), need another exit circ.
  697. Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Found 215 servers that might support 1/1 pending connections.
  698. Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Chose exit server '$8CA16E878293D11F0E0803E5FC09F93A5C666889~Auroch at 178.17.174.198'
  699. Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  700. Feb 17 03:57:22.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  701. Feb 17 03:57:22.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  702. Feb 17 03:57:22.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  703. Feb 17 03:57:22.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$2F9AFDE43DC8E3F05803304C01BD3DBF329169AC~dutreuil at 213.152.168.27'
  704. Feb 17 03:57:22.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 2F9AFDE43DC8E3F05803304C01BD3DBF329169AC. Our address is apparently 92.75.246.198.
  705. Feb 17 03:57:22.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  706. Feb 17 03:57:22.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F9AFDE43DC8E3F05803304C01BD3DBF329169AC(open) $D77F7FBE10944A62A07591250D5935786A84E276(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  707. Feb 17 03:57:22.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  708. Feb 17 03:57:22.000 [info] circuit_predict_and_launch_new(): Have 6 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  709. Feb 17 03:57:22.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  710. Feb 17 03:57:23.000 [info] circuit_predict_and_launch_new(): Have 6 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  711. Feb 17 03:57:23.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  712. Feb 17 03:57:26.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  713. Feb 17 03:57:26.000 [info] exit circ (length 3, last hop Auroch): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(closed) $8CA16E878293D11F0E0803E5FC09F93A5C666889(closed)
  714. Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  715. Feb 17 03:57:26.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 281.645508/299.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  716. Feb 17 03:57:26.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  717. Feb 17 03:57:26.000 [info] exit circ (length 3, last hop Auroch): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(closed)
  718. Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  719. Feb 17 03:57:26.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  720. Feb 17 03:57:26.000 [info] exit circ (length 3, last hop Auroch): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(open)
  721. Feb 17 03:57:26.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  722. Feb 17 03:57:26.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  723. Feb 17 03:57:26.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  724. Feb 17 03:57:26.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6822.198680ms, 60000.000000ms, Xm: 4737, a: 4.412105, r: 0.142000) based on 1000 circuit times
  725. Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): circuit built!
  726. Feb 17 03:57:26.000 [info] pathbias_count_build_success(): Got success count 282.645508/299.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  727. Feb 17 03:57:26.000 [info] exit circ (length 3): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(open)
  728. Feb 17 03:57:26.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
  729. Feb 17 03:57:26.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 0 on circ 3542240276 to begin stream 32012.
  730. Feb 17 03:57:26.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3542240276
  731. Feb 17 03:57:26.000 [info] connection_ap_handshake_send_begin(): Sending up to 66 + 0 bytes of queued-up data
  732. Feb 17 03:57:26.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
  733. Feb 17 03:57:26.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  734. Feb 17 03:57:26.000 [info] choose_good_exit_server_general(): Chose exit server '$317FA39B1255C8AFA0AFA45D2113E1C750B32925~ConradsOVHRelay02 at 144.217.164.185'
  735. Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  736. Feb 17 03:57:26.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3542240276 streamid 32012 after 0 seconds.
  737. Feb 17 03:57:26.000 [info] exit circ (length 3): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(open)
  738. Feb 17 03:57:27.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 32012. Removing stream.
  739. Feb 17 03:57:27.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
  740. Feb 17 03:57:27.000 [info] connection_dir_client_reached_eof(): Received server info (size 2290) from server '92.75.246.198:9030'
  741. Feb 17 03:57:27.000 [notice] Self-testing indicates your DirPort is reachable from the outside. Excellent.
  742. Feb 17 03:57:27.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: DirPort found reachable
  743. Feb 17 03:57:27.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
  744. Feb 17 03:57:27.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  745. Feb 17 03:57:27.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  746. Feb 17 03:57:27.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  747. Feb 17 03:57:27.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  748. Feb 17 03:57:27.000 [info] router_rebuild_descriptor(): Rebuilding relay descriptor
  749. Feb 17 03:57:27.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  750. Feb 17 03:57:27.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  751. Feb 17 03:57:27.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  752. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  753. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  754. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  755. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  756. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  757. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  758. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  759. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  760. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  761. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  762. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  763. Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  764. Feb 17 03:57:27.000 [info] extrainfo_dump_to_string(): Adding stats to extra-info descriptor.
  765. Feb 17 03:57:27.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  766. Feb 17 03:57:28.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  767. Feb 17 03:57:28.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  768. Feb 17 03:57:31.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
  769. Feb 17 03:57:31.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  770. Feb 17 03:57:31.000 [info] choose_good_exit_server_general(): Chose exit server '$7BFB908A3AA5B491DA4CA72CCBEE0E1F2A939B55~sofia at 77.247.181.162'
  771. Feb 17 03:57:31.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  772. Feb 17 03:57:32.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  773. Feb 17 03:57:32.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  774. Feb 17 03:57:33.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  775. Feb 17 03:57:33.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  776. Feb 17 03:57:36.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
  777. Feb 17 03:57:36.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  778. Feb 17 03:57:36.000 [info] choose_good_exit_server_general(): Chose exit server '$0593F5255316748247EBA76353A3A61F62224903~novatorrelay at 93.174.93.71'
  779. Feb 17 03:57:36.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  780. Feb 17 03:57:37.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  781. Feb 17 03:57:37.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  782. Feb 17 03:57:38.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  783. Feb 17 03:57:38.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  784. Feb 17 03:57:41.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
  785. Feb 17 03:57:41.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  786. Feb 17 03:57:41.000 [info] choose_good_exit_server_general(): Chose exit server '$E41B16F7DDF52EBB1DB4268AB2FE340B37AD8904~xmission1 at 166.70.207.2'
  787. Feb 17 03:57:41.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  788. Feb 17 03:57:42.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  789. Feb 17 03:57:42.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  790. Feb 17 03:57:43.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  791. Feb 17 03:57:43.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  792. Feb 17 03:57:46.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
  793. Feb 17 03:57:46.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  794. Feb 17 03:57:46.000 [info] choose_good_exit_server_general(): Chose exit server '$0593F5255316748247EBA76353A3A61F62224903~novatorrelay at 93.174.93.71'
  795. Feb 17 03:57:46.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  796. Feb 17 03:57:47.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
  797. Feb 17 03:57:47.000 [info] directory_send_command(): Downloading consensus from 47.21.17.37:9030 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
  798. Feb 17 03:57:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  799. Feb 17 03:57:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  800. Feb 17 03:57:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  801. Feb 17 03:57:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
  802. Feb 17 03:57:47.000 [info] routerlist_remove_old_routers(): We have 5989 live routers and 14258 old router descriptors.
  803. Feb 17 03:57:47.000 [info] consider_testing_reachability(): Testing reachability of my ORPort: 92.75.246.198:9001.
  804. Feb 17 03:57:47.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  805. Feb 17 03:57:48.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  806. Feb 17 03:57:48.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5989 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  807. Feb 17 03:57:48.000 [info] circuit_predict_and_launch_new(): Have 4 clean circs (1 uptime-internal, 1 internal), need another hidden service circ.
  808. Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  809. Feb 17 03:57:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  810. Feb 17 03:57:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  811. Feb 17 03:57:48.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  812. Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$227A940AC3AF002F17982D97E467AC481D391C58~Preece01 at 79.137.70.137'
  813. Feb 17 03:57:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 227A940AC3AF002F17982D97E467AC481D391C58. Our address is apparently 92.75.246.198.
  814. Feb 17 03:57:48.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  815. Feb 17 03:57:48.000 [info] internal circ (length 3, last hop RoteServerPaul): $227A940AC3AF002F17982D97E467AC481D391C58(open) $258D74360EB18DBB1E08648366B21B8AE00F9CD2(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  816. Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  817. Feb 17 03:57:48.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  818. Feb 17 03:57:48.000 [info] internal circ (length 3, last hop RoteServerPaul): $227A940AC3AF002F17982D97E467AC481D391C58(open) $258D74360EB18DBB1E08648366B21B8AE00F9CD2(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  819. Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  820. Feb 17 03:57:48.000 [info] channel_register(): Channel 0x4fda240 (global ID 9) in state opening (1) registered with no identity digest
  821. Feb 17 03:57:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:12176; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  822. Feb 17 03:57:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:12176: Waiting for AUTHENTICATE.
  823. Feb 17 03:57:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9001: Looks good.
  824. Feb 17 03:57:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9001; OR connection is now open, using protocol version 4. Its ID digest is 258D74360EB18DBB1E08648366B21B8AE00F9CD2. Our address is apparently 92.75.246.198.
  825. Feb 17 03:57:48.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
  826. Feb 17 03:57:48.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: ORPort found reachable
  827. Feb 17 03:57:48.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  828. Feb 17 03:57:48.000 [info] internal circ (length 3, last hop RoteServerPaul): $227A940AC3AF002F17982D97E467AC481D391C58(open) $258D74360EB18DBB1E08648366B21B8AE00F9CD2(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
  829. Feb 17 03:57:48.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  830. Feb 17 03:57:48.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  831. Feb 17 03:57:48.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  832. Feb 17 03:57:48.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6822.198680ms, 60000.000000ms, Xm: 4737, a: 4.412105, r: 0.142000) based on 1000 circuit times
  833. Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): circuit built!
  834. Feb 17 03:57:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  835. Feb 17 03:57:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  836. Feb 17 03:57:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  837. Feb 17 03:57:48.000 [info] router_rebuild_descriptor(): Rebuilding relay descriptor
  838. Feb 17 03:57:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  839. Feb 17 03:57:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  840. Feb 17 03:57:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  841. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  842. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  843. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  844. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  845. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  846. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  847. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  848. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  849. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  850. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  851. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  852. Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  853. Feb 17 03:57:48.000 [info] extrainfo_dump_to_string(): Adding stats to extra-info descriptor.
  854. Feb 17 03:57:48.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
  855. Feb 17 03:57:48.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  856. Feb 17 03:57:48.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  857. Feb 17 03:57:48.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
  858. Feb 17 03:57:48.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  859. Feb 17 03:57:49.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  860. Feb 17 03:57:49.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  861. Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  862. Feb 17 03:57:49.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:9001; Sending cells: CERTS
  863. Feb 17 03:57:49.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:9001: Authenticated it.
  864. Feb 17 03:57:49.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:9001: Sending authentication
  865. Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$360CBA08D1E24F513162047BDB54A1015E531534~Aerodynamik06 at 54.37.17.235'
  866. Feb 17 03:57:49.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9001; OR connection is now open, using protocol version 4. Its ID digest is 360CBA08D1E24F513162047BDB54A1015E531534. Our address is apparently 92.75.246.198.
  867. Feb 17 03:57:49.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  868. Feb 17 03:57:49.000 [info] internal circ (length 3, last hop RoteServerPaul): $360CBA08D1E24F513162047BDB54A1015E531534(open) $0FC19616FD1AA6266703BA2893CF7EDF6525F860(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  869. Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  870. Feb 17 03:57:49.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  871. Feb 17 03:57:49.000 [info] internal circ (length 3, last hop RoteServerPaul): $360CBA08D1E24F513162047BDB54A1015E531534(open) $0FC19616FD1AA6266703BA2893CF7EDF6525F860(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  872. Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  873. Feb 17 03:57:49.000 [info] channel_register(): Channel 0x35f39a8 (global ID 12) in state opening (1) registered with no identity digest
  874. Feb 17 03:57:49.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:56690; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  875. Feb 17 03:57:49.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:56690: Waiting for AUTHENTICATE.
  876. Feb 17 03:57:49.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9001: Looks good.
  877. Feb 17 03:57:49.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9001; OR connection is now open, using protocol version 4. Its ID digest is 0FC19616FD1AA6266703BA2893CF7EDF6525F860. Our address is apparently 92.75.246.198.
  878. Feb 17 03:57:49.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
  879. Feb 17 03:57:49.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  880. Feb 17 03:57:49.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  881. Feb 17 03:57:49.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  882. Feb 17 03:57:49.000 [info] internal circ (length 3, last hop RoteServerPaul): $360CBA08D1E24F513162047BDB54A1015E531534(open) $0FC19616FD1AA6266703BA2893CF7EDF6525F860(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
  883. Feb 17 03:57:49.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  884. Feb 17 03:57:49.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  885. Feb 17 03:57:49.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  886. Feb 17 03:57:49.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6822.198680ms, 60000.000000ms, Xm: 4737, a: 4.412105, r: 0.142000) based on 1000 circuit times
  887. Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): circuit built!
  888. Feb 17 03:57:49.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
  889. Feb 17 03:57:49.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  890. Feb 17 03:57:50.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  891. Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  892. Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  893. Feb 17 03:57:50.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  894. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257~TOR2DFN01b at 217.182.198.95'
  895. Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257. Our address is apparently 92.75.246.198.
  896. Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  897. Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257(open) $BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  898. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  899. Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  900. Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257(open) $BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  901. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  902. Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  903. Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  904. Feb 17 03:57:50.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  905. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$CEECFBB82FC484051E89719C49DC803F65AABC72~vautier at 5.135.65.145'
  906. Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is CEECFBB82FC484051E89719C49DC803F65AABC72. Our address is apparently 92.75.246.198.
  907. Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  908. Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $CEECFBB82FC484051E89719C49DC803F65AABC72(open) $BE6CF26814BD1F35B76FE576702DBA9627EE8237(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  909. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  910. Feb 17 03:57:50.000 [info] channel_register(): Channel 0x2fe7850 (global ID 15) in state opening (1) registered with no identity digest
  911. Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  912. Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $CEECFBB82FC484051E89719C49DC803F65AABC72(open) $BE6CF26814BD1F35B76FE576702DBA9627EE8237(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  913. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  914. Feb 17 03:57:50.000 [info] channel_register(): Channel 0x32310f0 (global ID 16) in state opening (1) registered with no identity digest
  915. Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:52975; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  916. Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:51923; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  917. Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:52975: Waiting for AUTHENTICATE.
  918. Feb 17 03:57:50.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:6881: Looks good.
  919. Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:6881; OR connection is now open, using protocol version 4. Its ID digest is BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1. Our address is apparently 92.75.246.198.
  920. Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:51923: Waiting for AUTHENTICATE.
  921. Feb 17 03:57:50.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  922. Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is BE6CF26814BD1F35B76FE576702DBA9627EE8237. Our address is apparently 92.75.246.198.
  923. Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  924. Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257(open) $BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
  925. Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  926. Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  927. Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  928. Feb 17 03:57:50.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6821.217931ms, 60000.000000ms, Xm: 4737, a: 4.413845, r: 0.142000) based on 1000 circuit times
  929. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): circuit built!
  930. Feb 17 03:57:50.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
  931. Feb 17 03:57:50.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
  932. Feb 17 03:57:50.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  933. Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  934. Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $CEECFBB82FC484051E89719C49DC803F65AABC72(open) $BE6CF26814BD1F35B76FE576702DBA9627EE8237(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
  935. Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  936. Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  937. Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  938. Feb 17 03:57:50.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6813.534630ms, 60000.000000ms, Xm: 4737, a: 4.427529, r: 0.141000) based on 1000 circuit times
  939. Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): circuit built!
  940. Feb 17 03:57:50.000 [notice] Performing bandwidth self-test...done.
  941. Feb 17 03:57:51.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
  942. Feb 17 03:57:51.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
  943. Feb 17 03:57:51.000 [info] choose_good_exit_server_general(): Chose exit server '$204DFD2A2C6A0DC1FA0EACB495218E0B661704FD~HaveHeart at 77.247.181.164'
  944. Feb 17 03:57:51.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
  945. Feb 17 03:57:52.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  946. Feb 17 03:57:52.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  947. Feb 17 03:57:52.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  948. Feb 17 03:57:52.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1~wien at 94.23.247.42'
  949. Feb 17 03:57:52.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1. Our address is apparently 92.75.246.198.
  950. Feb 17 03:57:52.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  951. Feb 17 03:57:52.000 [info] internal (high-uptime) circ (length 3, last hop Unnamed): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $1D2E445EAB4936BB397C965A5576F8548AB496AC(closed) $FF3059E77E5D22F1C3B20CCBE125691AD27588DD(closed)
  952. Feb 17 03:57:52.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  953. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  954. Feb 17 03:57:53.000 [info] internal circ (length 3, last hop RoteServerPaul): $06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1(open) $2A5746BFF32A363CD3AAD05196C0F10E7143BBB6(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  955. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  956. Feb 17 03:57:53.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 282.645508/300.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  957. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  958. Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Unnamed): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $1D2E445EAB4936BB397C965A5576F8548AB496AC(open) $FF3059E77E5D22F1C3B20CCBE125691AD27588DD(closed)
  959. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  960. Feb 17 03:57:53.000 [info] Received http status code 304 ("Not modified") from server '47.21.17.37:9030' while fetching consensus directory.
  961. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  962. Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Freebird32): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $A22EB053B055631C8022634CFDAF5AFDACA1ADE8(closed) $0C475BA4D3AA3C289B716F95954CAD616E50C4E5(closed)
  963. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  964. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  965. Feb 17 03:57:53.000 [info] internal circ (length 3, last hop RoteServerPaul): $06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1(open) $2A5746BFF32A363CD3AAD05196C0F10E7143BBB6(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  966. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  967. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  968. Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Unnamed): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $1D2E445EAB4936BB397C965A5576F8548AB496AC(open) $FF3059E77E5D22F1C3B20CCBE125691AD27588DD(open)
  969. Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  970. Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  971. Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  972. Feb 17 03:57:53.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6776.204984ms, 60000.000000ms, Xm: 4737, a: 4.495471, r: 0.140000) based on 1000 circuit times
  973. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): circuit built!
  974. Feb 17 03:57:53.000 [info] pathbias_count_build_success(): Got success count 283.645508/300.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  975. Feb 17 03:57:53.000 [info] pathbias_scale_close_rates(): Scaled pathbias counts to (144.322754,134.447510)/153.050049 (5/1 open) for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  976. Feb 17 03:57:53.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 144.322754/154.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  977. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  978. Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Freebird32): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $A22EB053B055631C8022634CFDAF5AFDACA1ADE8(open) $0C475BA4D3AA3C289B716F95954CAD616E50C4E5(closed)
  979. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  980. Feb 17 03:57:53.000 [info] channel_register(): Channel 0x238e028 (global ID 18) in state opening (1) registered with no identity digest
  981. Feb 17 03:57:53.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
  982. Feb 17 03:57:53.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
  983. Feb 17 03:57:53.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
  984. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$456C1E39B5780CD05267F8EFEF123A2FA8DB7715~fithnovember at 79.137.116.43'
  985. Feb 17 03:57:53.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 456C1E39B5780CD05267F8EFEF123A2FA8DB7715. Our address is apparently 92.75.246.198.
  986. Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  987. Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Freebird32): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $A22EB053B055631C8022634CFDAF5AFDACA1ADE8(open) $0C475BA4D3AA3C289B716F95954CAD616E50C4E5(open)
  988. Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  989. Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
  990. Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4625 23
  991. Feb 17 03:57:53.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6772.457165ms, 60000.000000ms, Xm: 4730, a: 4.483879, r: 0.140000) based on 1000 circuit times
  992. Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): circuit built!
  993. Feb 17 03:57:53.000 [info] pathbias_count_build_success(): Got success count 145.322754/154.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  994. Feb 17 03:57:54.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  995. Feb 17 03:57:54.000 [info] internal circ (length 3, last hop RoteServerPaul): $456C1E39B5780CD05267F8EFEF123A2FA8DB7715(open) $18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  996. Feb 17 03:57:54.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  997. Feb 17 03:57:54.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:54584; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  998. Feb 17 03:57:54.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:54584: Waiting for AUTHENTICATE.
  999. Feb 17 03:57:54.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1000. Feb 17 03:57:54.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 2A5746BFF32A363CD3AAD05196C0F10E7143BBB6. Our address is apparently 92.75.246.198.
  1001. Feb 17 03:57:54.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  1002. Feb 17 03:57:54.000 [info] internal circ (length 3, last hop RoteServerPaul): $456C1E39B5780CD05267F8EFEF123A2FA8DB7715(open) $18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  1003. Feb 17 03:57:54.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  1004. Feb 17 03:57:54.000 [info] channel_register(): Channel 0x3856108 (global ID 19) in state opening (1) registered with no identity digest
  1005. Feb 17 03:57:54.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  1006. Feb 17 03:57:54.000 [info] internal circ (length 3, last hop RoteServerPaul): $06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1(open) $2A5746BFF32A363CD3AAD05196C0F10E7143BBB6(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
  1007. Feb 17 03:57:54.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  1008. Feb 17 03:57:54.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
  1009. Feb 17 03:57:54.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4625 22
  1010. Feb 17 03:57:54.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6773.528325ms, 60000.000000ms, Xm: 4732, a: 4.487186, r: 0.140000) based on 1000 circuit times
  1011. Feb 17 03:57:54.000 [info] circuit_send_next_onion_skin(): circuit built!
  1012. Feb 17 03:57:54.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:59944; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1013. Feb 17 03:57:54.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:59944: Waiting for AUTHENTICATE.
  1014. Feb 17 03:57:54.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:36746: Looks good.
  1015. Feb 17 03:57:54.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:36746; OR connection is now open, using protocol version 4. Its ID digest is 18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB. Our address is apparently 92.75.246.198.
  1016. Feb 17 03:57:55.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  1017. Feb 17 03:57:55.000 [info] internal circ (length 3, last hop RoteServerPaul): $456C1E39B5780CD05267F8EFEF123A2FA8DB7715(open) $18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
  1018. Feb 17 03:57:55.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  1019. Feb 17 03:57:55.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
  1020. Feb 17 03:57:55.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4625 22
  1021. Feb 17 03:57:55.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6773.528325ms, 60000.000000ms, Xm: 4732, a: 4.487186, r: 0.140000) based on 1000 circuit times
  1022. Feb 17 03:57:55.000 [info] circuit_send_next_onion_skin(): circuit built!
  1023. Feb 17 03:57:56.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  1024. Feb 17 03:57:56.000 [info] exit circ (length 3, last hop HaveHeart): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(closed) $204DFD2A2C6A0DC1FA0EACB495218E0B661704FD(closed)
  1025. Feb 17 03:57:56.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  1026. Feb 17 03:57:56.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 145.322754/155.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  1027. Feb 17 03:57:56.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  1028. Feb 17 03:57:56.000 [info] exit circ (length 3, last hop HaveHeart): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(open) $204DFD2A2C6A0DC1FA0EACB495218E0B661704FD(closed)
  1029. Feb 17 03:57:56.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  1030. Feb 17 03:57:56.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  1031. Feb 17 03:57:56.000 [info] exit circ (length 3, last hop HaveHeart): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(open) $204DFD2A2C6A0DC1FA0EACB495218E0B661704FD(open)
  1032. Feb 17 03:57:56.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  1033. Feb 17 03:57:56.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 33
  1034. Feb 17 03:57:56.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  1035. Feb 17 03:57:56.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6776.204984ms, 60000.000000ms, Xm: 4737, a: 4.495471, r: 0.140000) based on 1000 circuit times
  1036. Feb 17 03:57:56.000 [info] circuit_send_next_onion_skin(): circuit built!
  1037. Feb 17 03:57:56.000 [info] pathbias_count_build_success(): Got success count 146.322754/155.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
  1038. Feb 17 03:58:02.000 [info] channel_register(): Channel 0x2fa9d88 (global ID 20) in state opening (1) registered with no identity digest
  1039. Feb 17 03:58:02.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:39827; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1040. Feb 17 03:58:22.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
  1041. Feb 17 03:58:22.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
  1042. Feb 17 03:58:22.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
  1043. Feb 17 03:58:22.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6826.997642ms, 60000.000000ms, Xm: 4737, a: 4.403616, r: 0.139000) based on 1000 circuit times
  1044. Feb 17 03:58:22.000 [info] circuit_expire_building(): Abandoning circ 6 213.152.168.27:443:2730721988 (state 0,0:doing handshakes, purpose 13, len 3)
  1045. Feb 17 03:58:22.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F9AFDE43DC8E3F05803304C01BD3DBF329169AC(open) $D77F7FBE10944A62A07591250D5935786A84E276(waiting for keys) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
  1046. Feb 17 03:58:22.000 [info] pathbias_should_count(): Bug: Circuit 6 is now being counted despite being ignored in the past. Purpose is Measuring circuit timeout, path state is new (on Tor 0.2.9.14 )
  1047. Feb 17 03:58:44.000 [info] channel_register(): Channel 0x3f5c2f8 (global ID 21) in state opening (1) registered with no identity digest
  1048. Feb 17 03:58:45.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:47688; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1049. Feb 17 03:58:47.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5989 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  1050. Feb 17 03:58:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1051. Feb 17 03:58:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1052. Feb 17 03:58:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1053. Feb 17 03:58:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
  1054. Feb 17 03:58:47.000 [info] router_upload_dir_desc_to_dirservers(): Uploading relay descriptor to directory authorities
  1055. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1056. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1057. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1058. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1059. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1060. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1061. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1062. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1063. Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
  1064. Feb 17 03:58:47.000 [info] routerlist_remove_old_routers(): We have 5989 live routers and 14257 old router descriptors.
  1065. Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1066. Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1067. Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1068. Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1069. Feb 17 03:58:47.000 [info] channel_register(): Channel 0x4aa5a60 (global ID 22) in state opening (1) registered with no identity digest
  1070. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x5981bf0 (global ID 23) in state opening (1) registered with no identity digest
  1071. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x56bb4a8 (global ID 24) in state opening (1) registered with no identity digest
  1072. Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1073. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x31fd350 (global ID 25) in state opening (1) registered with no identity digest
  1074. Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1075. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x4a8db90 (global ID 26) in state opening (1) registered with no identity digest
  1076. Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1077. Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1078. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:36539; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1079. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x4675600 (global ID 27) in state opening (1) registered with no identity digest
  1080. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:33599; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1081. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x2d96b28 (global ID 28) in state opening (1) registered with no identity digest
  1082. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:46800; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1083. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x2daf9c0 (global ID 29) in state opening (1) registered with no identity digest
  1084. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:36539: Waiting for AUTHENTICATE.
  1085. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1086. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 7EA6EAD6FD83083C538F44038BBFA077587DD755. Our address is apparently 92.75.246.198.
  1087. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:51181; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1088. Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
  1089. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:33599: Waiting for AUTHENTICATE.
  1090. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1091. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 847B1F850344D7876491A54892F904934E4EB85D. Our address is apparently 92.75.246.198.
  1092. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:33911; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1093. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:46800: Waiting for AUTHENTICATE.
  1094. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1095. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is F2044413DAC2E02E3D6BCF4735A19BCA1DE97281. Our address is apparently 92.75.246.198.
  1096. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:51181: Waiting for AUTHENTICATE.
  1097. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1098. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 7BE683E65D48141321C5ED92F075C55364AC7123. Our address is apparently 92.75.246.198.
  1099. Feb 17 03:58:48.000 [info] channel_register(): Channel 0x49453f8 (global ID 30) in state opening (1) registered with no identity digest
  1100. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:33911: Waiting for AUTHENTICATE.
  1101. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:80: Looks good.
  1102. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:80; OR connection is now open, using protocol version 4. Its ID digest is BD6A829255CB08E66FBE7D3748363586E46B3810. Our address is apparently 92.75.246.198.
  1103. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:40732; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1104. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:40185; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1105. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:40732: Waiting for AUTHENTICATE.
  1106. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9101: Looks good.
  1107. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9101; OR connection is now open, using protocol version 4. Its ID digest is 9695DFC35FFEB861329B9F1AB04C46397020CE31. Our address is apparently 92.75.246.198.
  1108. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:37045; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1109. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:40185: Waiting for AUTHENTICATE.
  1110. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1111. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 74A910646BCEEFBCD2E874FC1DC997430F968145. Our address is apparently 92.75.246.198.
  1112. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:37045: Waiting for AUTHENTICATE.
  1113. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1114. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is CF6D0AAFB385BE71B8E111FC5CFF4B47923733BC. Our address is apparently 92.75.246.198.
  1115. Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:41893; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1116. Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:41893: Waiting for AUTHENTICATE.
  1117. Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1118. Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 24E2F139121D4394C54B5BCC368B3B411857C413. Our address is apparently 92.75.246.198.
  1119. Feb 17 03:58:59.000 [info] channel_register(): Channel 0x3bcabd8 (global ID 31) in state opening (1) registered with no identity digest
  1120. Feb 17 03:58:59.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:44394; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1121. Feb 17 03:59:19.000 [info] channel_register(): Channel 0x52f14f0 (global ID 32) in state opening (1) registered with no identity digest
  1122. Feb 17 03:59:19.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:51469; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1123. Feb 17 03:59:19.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:51469: Waiting for AUTHENTICATE.
  1124. Feb 17 03:59:19.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1125. Feb 17 03:59:19.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 7BE683E65D48141321C5ED92F075C55364AC7123. Our address is apparently 92.75.246.198.
  1126. Feb 17 03:59:19.000 [info] connection_or_group_set_badness(): Marking OR conn to 193.23.244.244:443 as unsuitable for new circuits: (fd 33, 31 secs old). We have a better canonical one (fd 38; 0 secs old).
  1127. Feb 17 03:59:19.000 [info] run_connection_housekeeping(): Expiring non-used OR connection to fd 33 (193.23.244.244:443) [Too old].
  1128. Feb 17 03:59:20.000 [info] channel_register(): Channel 0x31fd350 (global ID 33) in state opening (1) registered with no identity digest
  1129. Feb 17 03:59:20.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:39824; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1130. Feb 17 03:59:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1131. Feb 17 03:59:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1132. Feb 17 03:59:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1133. Feb 17 03:59:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
  1134. Feb 17 03:59:47.000 [info] routerlist_remove_old_routers(): We have 5989 live routers and 14255 old router descriptors.
  1135. Feb 17 03:59:47.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5989 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  1136. Feb 17 03:59:47.000 [info] launch_descriptor_downloads(): Launching 2 requests for 8 routerdescs, 4 at a time
  1137. Feb 17 03:59:47.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
  1138. Feb 17 03:59:47.000 [info] directory_send_command(): Downloading consensus from 86.59.21.38 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
  1139. Feb 17 03:59:47.000 [info] Received http status code 304 ("Not modified") from server '86.59.21.38:80' while fetching consensus directory.
  1140. Feb 17 03:59:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1141. Feb 17 03:59:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1142. Feb 17 03:59:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1143. Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 4487) from server '171.25.193.9:443'
  1144. Feb 17 03:59:48.000 [info] router_load_routers_from_string(): 2 elements to add
  1145. Feb 17 03:59:48.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
  1146. Feb 17 03:59:48.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 5990 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 7 in progress.
  1147. Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received 2/4 router descriptors requested from 171.25.193.9:443
  1148. Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 0) from server '199.58.81.140:80'
  1149. Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received http status code 404 ("Servers unavailable") from server '199.58.81.140:80' while fetching "/tor/server/d/A52C8354ACB2082B69004559B8813B3FBE4415A6+AA82E353F9FBF9FA8F88DFC09DE17358F68F09D5+CE1211E693770B50A2BF98969BC23B2B44E18E01+EF8D472A33927651F42419773ED7F04065F79E80.z". I'll try again soon.
  1150. Feb 17 04:00:47.000 [info] update_consensus_router_descriptor_downloads(): 7 router descriptors downloadable. 0 delayed; 5990 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  1151. Feb 17 04:00:47.000 [info] launch_descriptor_downloads(): Launching 2 requests for 7 routerdescs, 4 at a time
  1152. Feb 17 04:00:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1153. Feb 17 04:00:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1154. Feb 17 04:00:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1155. Feb 17 04:00:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
  1156. Feb 17 04:00:47.000 [info] routerlist_remove_old_routers(): We have 5990 live routers and 14252 old router descriptors.
  1157. Feb 17 04:00:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1158. Feb 17 04:00:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1159. Feb 17 04:00:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1160. Feb 17 04:00:47.000 [info] connection_dir_client_reached_eof(): Received server info (size 2260) from server '131.188.40.189:80'
  1161. Feb 17 04:00:47.000 [info] router_load_routers_from_string(): 1 elements to add
  1162. Feb 17 04:00:48.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 5991 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 6 in progress.
  1163. Feb 17 04:00:48.000 [info] connection_dir_client_reached_eof(): Received 1/3 router descriptors requested from 131.188.40.189:80
  1164. Feb 17 04:00:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1165. Feb 17 04:00:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1166. Feb 17 04:00:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1167. Feb 17 04:00:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 2247) from server '199.58.81.140:80'
  1168. Feb 17 04:00:48.000 [info] router_load_routers_from_string(): 1 elements to add
  1169. Feb 17 04:00:48.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
  1170. Feb 17 04:00:49.000 [info] connection_dir_client_reached_eof(): Received 1/4 router descriptors requested from 199.58.81.140:80
  1171. Feb 17 04:00:49.000 [info] channel_register(): Channel 0x32dc2b0 (global ID 34) in state opening (1) registered with no identity digest
  1172. Feb 17 04:00:49.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:48472; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1173. Feb 17 04:00:59.000 [info] channel_register(): Channel 0x32dc2b0 (global ID 35) in state opening (1) registered with no identity digest
  1174. Feb 17 04:01:00.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:50632; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1175. Feb 17 04:01:00.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:50632: Waiting for AUTHENTICATE.
  1176. Feb 17 04:01:00.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
  1177. Feb 17 04:01:00.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 74A910646BCEEFBCD2E874FC1DC997430F968145. Our address is apparently 92.75.246.198.
  1178. Feb 17 04:01:18.000 [info] channel_register(): Channel 0x32dc2b0 (global ID 36) in state opening (1) registered with no identity digest
  1179. Feb 17 04:01:18.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:33933; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1180. Feb 17 04:01:18.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:33933: Waiting for AUTHENTICATE.
  1181. Feb 17 04:01:18.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9101: Looks good.
  1182. Feb 17 04:01:18.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9101; OR connection is now open, using protocol version 4. Its ID digest is 9695DFC35FFEB861329B9F1AB04C46397020CE31. Our address is apparently 92.75.246.198.
  1183. Feb 17 04:01:18.000 [info] connection_or_group_set_badness(): Marking OR conn to 128.31.0.34:9101 as unsuitable for new circuits: (fd 34, 150 secs old). We have a better canonical one (fd 33; 0 secs old).
  1184. Feb 17 04:01:18.000 [info] run_connection_housekeeping(): Expiring non-used OR connection to fd 34 (128.31.0.34:9101) [Too old].
  1185. Feb 17 04:01:21.000 [info] channel_register(): Channel 0x4675600 (global ID 37) in state opening (1) registered with no identity digest
  1186. Feb 17 04:01:21.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:26853; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  1187. Feb 17 04:01:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1188. Feb 17 04:01:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1189. Feb 17 04:01:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1190. Feb 17 04:01:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
  1191. Feb 17 04:01:47.000 [info] routerlist_remove_old_routers(): We have 5991 live routers and 14252 old router descriptors.
  1192. Feb 17 04:01:47.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 5991 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  1193. Feb 17 04:01:47.000 [info] launch_descriptor_downloads(): Launching 2 requests for 6 routerdescs, 4 at a time
  1194. Feb 17 04:01:47.000 [info] connection_dir_client_reached_eof(): Received server info (size 0) from server '171.25.193.9:443'
  1195. Feb 17 04:01:47.000 [info] connection_dir_client_reached_eof(): Received http status code 404 ("Servers unavailable") from server '171.25.193.9:443' while fetching "/tor/server/d/AA82E353F9FBF9FA8F88DFC09DE17358F68F09D5+CE1211E693770B50A2BF98969BC23B2B44E18E01.z". I'll try again soon.
  1196. Feb 17 04:01:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
  1197. Feb 17 04:01:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
  1198. Feb 17 04:01:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
  1199. Feb 17 04:01:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 2247) from server '199.58.81.140:80'
  1200. Feb 17 04:01:48.000 [info] router_load_routers_from_string(): 1 elements to add
  1201. Feb 17 04:01:48.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
  1202. Feb 17 04:01:48.000 [info] connection_dir_client_reached_eof(): Received 1/4 router descriptors requested from 199.58.81.140:80
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top