Advertisement
Guest User

Untitled

a guest
Dec 31st, 2017
317
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 55.48 KB | None | 0 0
  1. Jan 01 03:45:27.000 [notice] Tor 0.3.1.9 (git-727d3f1b5e6eeda7) opening new log file.
  2. Jan 01 03:45:27.565 [notice] Tor 0.3.1.9 (git-727d3f1b5e6eeda7) running on Windows 8 [server] with Libevent 2.0.22-stable, OpenSSL 1.0.2k, Zlib 1.2.8, Liblzma N/A, and Libzstd N/A.
  3. Jan 01 03:45:27.565 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
  4. Jan 01 03:45:27.573 [notice] Read configuration file "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc-defaults".
  5. Jan 01 03:45:27.573 [notice] Read configuration file "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc".
  6. Jan 01 03:45:27.577 [notice] Based on detected system memory, MaxMemInQueues is set to 767 MB. You can override this by setting MaxMemInQueues by hand.
  7. Jan 01 03:45:27.578 [warn] Tor is running as an exit relay. If you did not want this behavior, please set the ExitRelay option to 0. If you do want to run an exit Relay, please set the ExitRelay option to 1 to disable this warning, and for forward compatibility.
  8. Jan 01 03:45:27.579 [notice] Opening Socks listener on 127.0.0.1:9150
  9. Jan 01 03:45:27.579 [notice] Opening Control listener on 127.0.0.1:9151
  10. Jan 01 03:45:27.579 [notice] Opening OR listener on 0.0.0.0:9001
  11. Jan 01 03:45:27.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
  12. Jan 01 03:45:27.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 14968, ConnLimit_high_thresh 14904, ConnLimit_low_thresh 11226
  13. Jan 01 03:45:27.000 [info] tor_lockfile_lock(): Locking "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\lock"
  14. Jan 01 03:45:27.000 [info] or_state_load(): Loaded state from "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\state"
  15. Jan 01 03:45:27.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
  16. Jan 01 03:45:27.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
  17. Jan 01 03:45:27.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.)
  18. Jan 01 03:45:27.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
  19. Jan 01 03:45:27.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.)
  20. Jan 01 03:45:27.000 [info] circuit_build_times_parse_state(): Adding 0 timeouts.
  21. Jan 01 03:45:27.000 [info] circuit_build_times_parse_state(): Loaded 104/104 values from 28 lines in circuit time histogram
  22. Jan 01 03:45:27.000 [info] circuit_build_times_get_xm(): Xm mode #0: 525 16
  23. Jan 01 03:45:27.000 [info] circuit_build_times_set_timeout(): Set buildtimeout to low value 993.730444ms. Setting to 1500ms
  24. Jan 01 03:45:27.000 [info] circuit_build_times_set_timeout(): Based on 104 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 2 seconds.
  25. Jan 01 03:45:27.000 [info] circuit_build_times_set_timeout(): Circuit timeout data: 1500.000000ms, 60000.000000ms, Xm: 525, a: 2.522362, r: 0.105769
  26. Jan 01 03:45:27.000 [info] circuit_build_times_filter_timeouts(): We had 10 timeouts out of 104 build times, and filtered 0 above the max of 60000
  27. Jan 01 03:45:27.000 [info] read_file_to_str(): Could not open "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\router-stability": No such file or directory
  28. Jan 01 03:45:27.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec TorBrowser\Tor\PluggableTransports\fteproxy --managed) does not provide any needed transports and will not be launched.
  29. Jan 01 03:45:27.000 [info] parse_transport_line(): Pluggable transport proxy (obfs2,obfs3,obfs4,scramblesuit exec TorBrowser\Tor\PluggableTransports\obfs4proxy) does not provide any needed transports and will not be launched.
  30. Jan 01 03:45:27.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec TorBrowser\Tor\PluggableTransports\terminateprocess-buffer TorBrowser\Tor\PluggableTransports\meek-client-torbrowser -- TorBrowser\Tor\PluggableTransports\meek-client) does not provide any needed transports and will not be launched.
  31. Jan 01 03:45:27.000 [info] init_cookie_authentication(): Generated auth cookie file in '"C:\\Users\\Administrator\\Desktop\\Tor Browser\\Browser\\TorBrowser\\Data\\Tor\\control_auth_cookie"'.
  32. Jan 01 03:45:27.000 [info] tor_process_monitor_new(): Successfully opened handle to process 4080; monitoring it.
  33. Jan 01 03:45:27.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
  34. Jan 01 03:45:27.000 [notice] Parsing GEOIP IPv4 file C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip.
  35. Jan 01 03:45:28.000 [notice] Parsing GEOIP IPv6 file C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip6.
  36. Jan 01 03:45:28.000 [info] options_act(): Configured to measure hidden service statistics.
  37. Jan 01 03:45:28.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
  38. Jan 01 03:45:28.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: config change
  39. Jan 01 03:45:28.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 2726 more seconds.
  40. Jan 01 03:45:28.000 [info] crypto_global_init(): NOT using OpenSSL engine support.
  41. Jan 01 03:45:28.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
  42. Jan 01 03:45:28.000 [info] eventdns: Added nameserver 172.31.0.2:53 as 03063E00
  43. Jan 01 03:45:28.000 [info] eventdns: Successfully added 172.31.0.2 as nameserver
  44. Jan 01 03:45:28.000 [info] eventdns: Setting maximum allowed timeouts to 255
  45. Jan 01 03:45:28.000 [info] eventdns: Setting retries to 1
  46. Jan 01 03:45:28.000 [info] eventdns: Setting maximum inflight requests to 8192
  47. Jan 01 03:45:28.000 [info] eventdns: Setting timeout to 5
  48. Jan 01 03:45:28.000 [info] init_keys(): Reading/making identity key "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\keys\secret_id_key"...
  49. Jan 01 03:45:28.000 [info] init_keys(): Reading/making onion key "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\keys\secret_onion_key"...
  50. Jan 01 03:45:28.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: set onion key
  51. Jan 01 03:45:28.000 [info] resolve_my_address(): Guessed local hostname 'EC2AMAZ-NV9N5QF' resolves to a private IP address (172.31.22.6). Trying something else.
  52. Jan 01 03:45:28.000 [info] resolve_my_address(): Interface IP address '172.31.22.6' is a private address too. Ignoring.
  53. Jan 01 03:45:28.000 [info] resolve_my_address(): Address 'EC2AMAZ-NV9N5QF' resolves to private IP address '172.31.22.6'. Tor servers that use the default DirAuthorities must have public IP addresses.
  54. Jan 01 03:45:28.000 [info] router_write_fingerprint(): Dumping fingerprint to "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\fingerprint"...
  55. Jan 01 03:45:28.000 [notice] Your Tor server's identity key fingerprint is 'danielnorthy77 8A95D5940A41B41FF17DB5D7CCA176D1D08922EA'
  56. Jan 01 03:45:28.000 [notice] Bootstrapped 0%: Starting
  57. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
  58. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1
  59. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
  60. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority tor26 with signing key 6AEC757516B142855BCE29708EBDA965AC3DD06A
  61. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority maatuska with signing key C9C96501FD35732C45C424B74CC32739991B1F51
  62. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority Faravahar with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC
  63. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dannenberg with signing key E66AE3C828CCAA8A765620B2750DD6257C9A52D4
  64. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority gabelmoo with signing key 28EB6C6635F1DB90BB60AF8B43F1676E892BB30B
  65. Jan 01 03:45:28.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A
  66. Jan 01 03:45:29.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
  67. Jan 01 03:45:29.000 [info] consdiffmgr_add_consensus(): We already have a copy of that consensus
  68. Jan 01 03:45:29.000 [info] read_file_to_str(): Could not open "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\unverified-consensus": No such file or directory
  69. Jan 01 03:45:30.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
  70. Jan 01 03:45:30.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 6208 descriptors.
  71. Jan 01 03:45:30.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live ns consensus will be the most recent until 2018-01-01 04:00:00 and will expire at 2018-01-01 06:00:00; fetching the next one at 2018-01-01 04:03:47.
  72. Jan 01 03:45:30.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live microdesc consensus will be the most recent until 2018-01-01 04:00:00 and will expire at 2018-01-01 06:00:00; fetching the next one at 2018-01-01 04:02:29.
  73. Jan 01 03:45:30.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
  74. Jan 01 03:45:30.000 [info] consdiffmgr_add_consensus(): We already have a copy of that consensus
  75. Jan 01 03:45:30.000 [info] read_file_to_str(): Could not open "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\unverified-microdesc-consensus": No such file or directory
  76. Jan 01 03:45:30.000 [info] routers_update_all_from_networkstatus(): The directory authorities say my version is ok.
  77. Jan 01 03:45:46.000 [info] router_load_routers_from_string(): 6205 elements to add
  78. Jan 01 03:45:46.000 [info] routerlist_remove_old_routers(): We have 6205 live routers and 0 old router descriptors.
  79. Jan 01 03:45:46.000 [info] tor_mmap_file(): Couldn't mmap file "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\cached-extrainfo": The system cannot find the file specified.
  80.  
  81.  
  82. Jan 01 03:45:46.000 [notice] Starting with guard context "default"
  83. Jan 01 03:45:46.000 [notice] Bootstrapped 80%: Connecting to the Tor network
  84. Jan 01 03:45:46.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 6205 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  85. Jan 01 03:45:46.000 [info] launch_descriptor_downloads(): Launching 1 request for 3 routerdescs, 4 at a time
  86. Jan 01 03:45:46.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
  87. Jan 01 03:45:46.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
  88. Jan 01 03:45:46.000 [info] entry_guards_update_primary(): 1/3: TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1) (confirmed)
  89. Jan 01 03:45:46.000 [info] entry_guards_update_primary(): 2/3: torStrasbourgX01 ($A4B6A5B608ABF5D7AB09BF60D4664891B842FB51) (confirmed)
  90. Jan 01 03:45:46.000 [info] entry_guards_update_primary(): 3/3: WorldOfTor ($388C836B4AC58ADF73C0FD2345494AA91CAEE16B) (confirmed)
  91. Jan 01 03:45:46.000 [notice] New control connection opened from 127.0.0.1.
  92. Jan 01 03:45:46.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 238.
  93. Jan 01 03:45:46.000 [info] channel_register(): Channel 044AB748 (global ID 2) in state opening (1) registered with no identity digest
  94. Jan 01 03:45:46.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 6205 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3 in progress.
  95. Jan 01 03:45:56.000 [info] routerlist_remove_old_routers(): We have 6205 live routers and 0 old router descriptors.
  96. Jan 01 03:45:56.000 [info] channel_check_for_duplicates(): Performed connection pruning. Found 0 connections to 0 relays. Found 0 current canonical connections, in 0 of which we were a non-canonical peer. 0 relays had more than 1 connection, 0 had more than 2, and 0 had more than 4 connections.
  97. Jan 01 03:45:56.000 [info] Monitored process 4080 is still alive.
  98. Jan 01 03:45:56.000 [notice] New control connection opened from 127.0.0.1.
  99. Jan 01 03:45:56.000 [info] handle_control_authenticate(): Authenticated control connection (744)
  100. Jan 01 03:45:56.000 [info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
  101. Jan 01 03:45:56.000 [info] origin_circuit_new(): Circuit 1 chose an idle timeout of 2750 based on 2698 seconds of predictive building remaining.
  102. Jan 01 03:45:56.000 [info] choose_good_exit_server_general(): Found 861 servers that might support 0/0 pending connections.
  103. Jan 01 03:45:56.000 [info] choose_good_exit_server_general(): Chose exit server '$335746A6DEB684FABDF3FC5835C3898F05C5A5A8~KyleBroflovski at 216.218.222.14'
  104. Jan 01 03:45:56.000 [info] extend_info_from_node(): Including Ed25519 ID for $335746A6DEB684FABDF3FC5835C3898F05C5A5A8~KyleBroflovski at 216.218.222.14
  105. Jan 01 03:45:56.000 [info] select_entry_guard_for_circuit(): Selected primary guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1) for circuit.
  106. Jan 01 03:45:56.000 [info] extend_info_from_node(): Including Ed25519 ID for $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46
  107. Jan 01 03:45:56.000 [info] extend_info_from_node(): Including Ed25519 ID for $844AE9CAD04325E955E2BE1521563B79FE7094B7~Smeerboel at 192.87.28.82
  108. Jan 01 03:45:56.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
  109. Jan 01 03:45:56.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 231.
  110. Jan 01 03:45:56.000 [info] connection_or_set_identity_digest(): Set identity digest for 06E77800 ([scrubbed]): EA8CEAA8939F20108D4388B6EAE867A5AC6442C1 SxmShdCovpJqh8aqnC/8jWhDjwoMy9l9HHZgwQRC3VI.
  111. Jan 01 03:45:56.000 [info] connection_or_set_identity_digest(): (Previously: 0000000000000000000000000000000000000000 <unset>)
  112. Jan 01 03:45:56.000 [info] connection_or_set_canonical(): Channel 3 chose an idle timeout of 3580.
  113. Jan 01 03:45:56.000 [info] or_state_save(): Saved state to "C:\Users\Administrator\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\state"
  114. Jan 01 03:45:56.000 [info] consdiffmgr_rescan_flavor_(): The most recent ns consensus is valid-after 2018-01-01T03:00:00. We have diffs to this consensus for 0/0 older ns consensuses. Generating diffs for the other 0.
  115. Jan 01 03:45:56.000 [info] consdiffmgr_rescan_flavor_(): The most recent microdesc consensus is valid-after 2018-01-01T03:00:00. We have diffs to this consensus for 0/0 older microdesc consensuses. Generating diffs for the other 0.
  116. Jan 01 03:45:56.000 [info] handle_control_authenticate(): Authenticated control connection (772)
  117. Jan 01 03:45:56.000 [info] connection_control_reached_eof(): Control connection reached EOF. Closing.
  118. Jan 01 03:45:56.000 [info] conn_close_if_marked(): Conn (addr [scrubbed], fd 744, type Control, state 1) marked, but wants to flush 8 bytes. (Marked at control.c:4822)
  119. Jan 01 03:45:56.000 [info] handle_control_takeownership(): Control connection 772 has taken ownership of this Tor instance.
  120. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:20-23' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  121. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:43' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  122. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:53' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  123. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:79-81' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  124. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:88' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  125. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:110' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  126. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:143' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  127. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:194' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  128. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:220' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  129. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:389' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  130. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:443' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  131. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:464' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  132. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:465' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  133. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:531' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  134. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:543-544' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  135. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:554' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  136. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  137. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:587' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  138. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:636' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  139. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:706' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  140. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:749' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  141. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:873' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  142. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:902-904' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  143. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:981' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  144. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:989-990' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  145. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:991' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  146. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:992' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  147. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:993' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  148. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:994' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  149. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:995' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  150. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1194' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  151. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1220' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  152. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1293' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  153. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1500' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  154. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1533' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  155. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1677' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  156. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1723' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  157. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1755' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  158. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1863' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  159. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:2082' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  160. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:2083' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  161. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:2086-2087' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  162. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:2095-2096' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  163. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:2102-2104' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  164. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:3128' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  165. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:3389' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  166. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:3690' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  167. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:4321' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  168. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:4643' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  169. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:5050' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  170. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:5190' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  171. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:5222-5223' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  172. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:5228' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  173. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:5900' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  174. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:6660-6669' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  175. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:6679' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  176. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:6697' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  177. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8000' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  178. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8008' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  179. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8074' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  180. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8080' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  181. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8082' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  182. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8087-8088' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  183. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8332-8333' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  184. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8443' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  185. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:8888' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  186. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:9418' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  187. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:9999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  188. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:10000' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  189. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:11371' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  190. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:19294' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  191. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:19638' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  192. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:50002' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  193. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:64738' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  194. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  195. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  196. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  197. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  198. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  199. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  200. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  201. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  202. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  203. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  204. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  205. Jan 01 03:45:56.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
  206. Jan 01 03:45:56.000 [info] set_max_file_descriptors(): This platform is missing getrlimit(). Proceeding.
  207. Jan 01 03:45:56.000 [notice] Tor 0.3.1.9 (git-727d3f1b5e6eeda7) opening log file.
  208. Jan 01 03:45:56.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 14968, ConnLimit_high_thresh 14904, ConnLimit_low_thresh 11226
  209. Jan 01 03:45:56.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec TorBrowser\Tor\PluggableTransports\fteproxy --managed) does not provide any needed transports and will not be launched.
  210. Jan 01 03:45:56.000 [info] parse_transport_line(): Pluggable transport proxy (obfs2,obfs3,obfs4,scramblesuit exec TorBrowser\Tor\PluggableTransports\obfs4proxy) does not provide any needed transports and will not be launched.
  211. Jan 01 03:45:56.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec TorBrowser\Tor\PluggableTransports\terminateprocess-buffer TorBrowser\Tor\PluggableTransports\meek-client-torbrowser -- TorBrowser\Tor\PluggableTransports\meek-client) does not provide any needed transports and will not be launched.
  212. Jan 01 03:45:56.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
  213. Jan 01 03:45:56.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
  214. Jan 01 03:45:56.000 [info] eventdns: Added nameserver 172.31.0.2:53 as 038AB420
  215. Jan 01 03:45:56.000 [info] eventdns: Successfully added 172.31.0.2 as nameserver
  216. Jan 01 03:45:56.000 [info] eventdns: Setting maximum allowed timeouts to 255
  217. Jan 01 03:45:56.000 [info] eventdns: Setting retries to 1
  218. Jan 01 03:45:56.000 [info] eventdns: Setting maximum inflight requests to 8192
  219. Jan 01 03:45:56.000 [info] eventdns: Setting timeout to 5
  220. Jan 01 03:45:56.000 [notice] New control connection opened from 127.0.0.1.
  221. Jan 01 03:45:56.000 [info] handle_response_fetch_desc(): Received server info (body size 0) from server '204.13.164.118:80'
  222. Jan 01 03:45:56.000 [info] handle_response_fetch_desc(): Received http status code 404 ("Servers unavailable") from server '204.13.164.118:80' while fetching "/tor/server/d/4119196142F99F55ED1715156D55E9D460C6BA28+5A6741A9BD4A7EAE1DF800E64DB9D8EF1B89CE6E+A7C2F7D5B0549613724712425F9A05093F81748A.z". I'll try again soon.
  223. Jan 01 03:45:56.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:49214; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
  224. Jan 01 03:45:56.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
  225. Jan 01 03:45:56.000 [info] handle_control_authenticate(): Authenticated control connection (584)
  226. Jan 01 03:45:56.000 [info] channel_tls_process_certs_cell(): Got some good RSA and Ed25519 certificates from [scrubbed]:49214. Waiting for AUTHENTICATE.
  227. Jan 01 03:45:56.000 [info] connection_or_set_identity_digest(): Set identity digest for 044AB650 ([scrubbed]): 74A910646BCEEFBCD2E874FC1DC997430F968145 bHzOT41w56KHh+w6TYwUhN4KrGwPWQWJX04/+tw/+RU.
  228. Jan 01 03:45:56.000 [info] connection_or_set_identity_digest(): (Previously: 0000000000000000000000000000000000000000 <unset>)
  229. Jan 01 03:45:56.000 [info] connection_or_set_canonical(): Channel 2 chose an idle timeout of 3070.
  230. Jan 01 03:45:56.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 5. Its ID digest is 74A910646BCEEFBCD2E874FC1DC997430F968145. Our address is apparently 52.32.112.6.
  231. Jan 01 03:45:56.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:59999; Sending cells: CERTS
  232. Jan 01 03:45:56.000 [info] connection_or_client_learned_peer_id(): learned peer id for 06E77800 ([scrubbed]): EA8CEAA8939F20108D4388B6EAE867A5AC6442C1, SxmShdCovpJqh8aqnC/8jWhDjwoMy9l9HHZgwQRC3VI
  233. Jan 01 03:45:56.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:59999: Authenticated it with RSA and Ed25519
  234. Jan 01 03:45:56.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:59999: Sending authentication type 3
  235. Jan 01 03:45:56.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
  236. Jan 01 03:45:56.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46'
  237. Jan 01 03:45:56.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:59999; OR connection is now open, using protocol version 5. Its ID digest is EA8CEAA8939F20108D4388B6EAE867A5AC6442C1. Our address is apparently 52.32.112.6.
  238. Jan 01 03:45:57.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  239. Jan 01 03:45:57.000 [info] exit circ (length 3, last hop KyleBroflovski): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $844AE9CAD04325E955E2BE1521563B79FE7094B7(closed) $335746A6DEB684FABDF3FC5835C3898F05C5A5A8(closed)
  240. Jan 01 03:45:57.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  241. Jan 01 03:45:57.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 95.000000/101.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  242. Jan 01 03:45:57.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  243. Jan 01 03:45:57.000 [info] exit circ (length 3, last hop KyleBroflovski): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $844AE9CAD04325E955E2BE1521563B79FE7094B7(open) $335746A6DEB684FABDF3FC5835C3898F05C5A5A8(closed)
  244. Jan 01 03:45:57.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  245. Jan 01 03:45:57.000 [info] circuit_predict_and_launch_new(): Have 1 clean circs (0 internal), need another exit circ.
  246. Jan 01 03:45:57.000 [info] origin_circuit_new(): Circuit 2 chose an idle timeout of 2708 based on 2697 seconds of predictive building remaining.
  247. Jan 01 03:45:57.000 [info] choose_good_exit_server_general(): Found 861 servers that might support 0/0 pending connections.
  248. Jan 01 03:45:57.000 [info] choose_good_exit_server_general(): Chose exit server '$60A7451D512B647C0D05A2063CA7F329311347B5~77cfe0d24828efc at 89.144.12.14'
  249. Jan 01 03:45:57.000 [info] select_entry_guard_for_circuit(): Selected primary guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1) for circuit.
  250. Jan 01 03:45:57.000 [info] extend_info_from_node(): Including Ed25519 ID for $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46
  251. Jan 01 03:45:57.000 [info] extend_info_from_node(): Including Ed25519 ID for $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA~3cce3a91f6a625 at 85.145.173.31
  252. Jan 01 03:45:57.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46'
  253. Jan 01 03:45:57.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  254. Jan 01 03:45:57.000 [info] exit circ (length 3, last hop 77cfe0d24828efc): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(closed) $60A7451D512B647C0D05A2063CA7F329311347B5(closed)
  255. Jan 01 03:45:57.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  256. Jan 01 03:45:57.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  257. Jan 01 03:45:57.000 [info] exit circ (length 3, last hop KyleBroflovski): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $844AE9CAD04325E955E2BE1521563B79FE7094B7(open) $335746A6DEB684FABDF3FC5835C3898F05C5A5A8(open)
  258. Jan 01 03:45:57.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  259. Jan 01 03:45:57.000 [info] circuit_build_times_get_xm(): Xm mode #0: 525 16
  260. Jan 01 03:45:57.000 [info] circuit_build_times_set_timeout(): Set buildtimeout to low value 991.454461ms. Setting to 5000ms
  261. Jan 01 03:45:57.000 [info] circuit_build_times_set_timeout(): Based on 105 circuit times, it looks like we need to wait longer for circuits to finish. We will now assume a circuit is too slow to use after waiting 5 seconds.
  262. Jan 01 03:45:57.000 [info] circuit_build_times_set_timeout(): Circuit timeout data: 5000.000000ms, 60000.000000ms, Xm: 525, a: 2.531459, r: 0.019048
  263. Jan 01 03:45:57.000 [info] circuit_send_next_onion_skin(): circuit built!
  264. Jan 01 03:45:57.000 [info] pathbias_count_build_success(): Got success count 96.000000/101.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  265. Jan 01 03:45:57.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
  266. Jan 01 03:45:57.000 [notice] Bootstrapped 100%: Done
  267. Jan 01 03:45:58.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 96.000000/102.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  268. Jan 01 03:45:58.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  269. Jan 01 03:45:58.000 [info] exit circ (length 3, last hop 77cfe0d24828efc): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(open) $60A7451D512B647C0D05A2063CA7F329311347B5(closed)
  270. Jan 01 03:45:58.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  271. Jan 01 03:45:58.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  272. Jan 01 03:45:58.000 [info] exit circ (length 3, last hop 77cfe0d24828efc): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(open) $60A7451D512B647C0D05A2063CA7F329311347B5(open)
  273. Jan 01 03:45:58.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  274. Jan 01 03:45:58.000 [info] circuit_build_times_get_xm(): Xm mode #0: 525 16
  275. Jan 01 03:45:58.000 [info] circuit_build_times_set_timeout(): Set buildtimeout to low value 992.920889ms. Setting to 5000ms
  276. Jan 01 03:45:58.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 5s (5000.000000ms, 60000.000000ms, Xm: 525, a: 2.525588, r: 0.018868) based on 106 circuit times
  277. Jan 01 03:45:58.000 [info] circuit_send_next_onion_skin(): circuit built!
  278. Jan 01 03:45:58.000 [info] pathbias_count_build_success(): Got success count 97.000000/102.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  279. Jan 01 03:45:58.000 [info] circuit_predict_and_launch_new(): Have 2 clean circs (0 uptime-internal, 0 internal), need another hidden service circ.
  280. Jan 01 03:45:58.000 [info] origin_circuit_new(): Circuit 3 chose an idle timeout of 2701 based on 2696 seconds of predictive building remaining.
  281. Jan 01 03:45:58.000 [info] extend_info_from_node(): Including Ed25519 ID for $6FAAD7CC7EBB008AEF2E5AE1BB9082CD8BD60648~isthistherealworld at 212.51.156.224
  282. Jan 01 03:45:58.000 [info] select_entry_guard_for_circuit(): Selected primary guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1) for circuit.
  283. Jan 01 03:45:58.000 [info] extend_info_from_node(): Including Ed25519 ID for $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46
  284. Jan 01 03:45:58.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46'
  285. Jan 01 03:45:58.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  286. Jan 01 03:45:58.000 [info] internal (high-uptime) circ (length 3, last hop isthistherealworld): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $30B9E0031BCA5FE759987BEA479EE92B006E7973(closed) $6FAAD7CC7EBB008AEF2E5AE1BB9082CD8BD60648(closed)
  287. Jan 01 03:45:58.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  288. Jan 01 03:45:58.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 97.000000/103.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  289. Jan 01 03:45:58.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  290. Jan 01 03:45:58.000 [info] internal (high-uptime) circ (length 3, last hop isthistherealworld): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $30B9E0031BCA5FE759987BEA479EE92B006E7973(open) $6FAAD7CC7EBB008AEF2E5AE1BB9082CD8BD60648(closed)
  291. Jan 01 03:45:58.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  292. Jan 01 03:45:59.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  293. Jan 01 03:45:59.000 [info] internal (high-uptime) circ (length 3, last hop isthistherealworld): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $30B9E0031BCA5FE759987BEA479EE92B006E7973(open) $6FAAD7CC7EBB008AEF2E5AE1BB9082CD8BD60648(open)
  294. Jan 01 03:45:59.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  295. Jan 01 03:45:59.000 [info] circuit_build_times_get_xm(): Xm mode #0: 525 16
  296. Jan 01 03:45:59.000 [info] circuit_build_times_set_timeout(): Set buildtimeout to low value 989.616893ms. Setting to 5000ms
  297. Jan 01 03:45:59.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 5s (5000.000000ms, 60000.000000ms, Xm: 525, a: 2.538867, r: 0.018692) based on 107 circuit times
  298. Jan 01 03:45:59.000 [info] circuit_send_next_onion_skin(): circuit built!
  299. Jan 01 03:45:59.000 [info] pathbias_count_build_success(): Got success count 98.000000/103.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  300. Jan 01 03:45:59.000 [notice] New control connection opened from 127.0.0.1.
  301. Jan 01 03:45:59.000 [info] handle_control_authenticate(): Authenticated control connection (708)
  302. Jan 01 03:45:59.000 [notice] New control connection opened from 127.0.0.1.
  303. Jan 01 03:45:59.000 [info] handle_control_authenticate(): Authenticated control connection (764)
  304. Jan 01 03:45:59.000 [info] circuit_predict_and_launch_new(): Have 3 clean circs (1 uptime-internal, 1 internal), need another hidden service circ.
  305. Jan 01 03:45:59.000 [info] origin_circuit_new(): Circuit 4 chose an idle timeout of 2797 based on 2695 seconds of predictive building remaining.
  306. Jan 01 03:45:59.000 [info] extend_info_from_node(): Including Ed25519 ID for $7C5E843AD82EF7F3CC95099161DD1771B3ADB925~charon at 35.201.2.6
  307. Jan 01 03:45:59.000 [info] select_entry_guard_for_circuit(): Selected primary guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1) for circuit.
  308. Jan 01 03:45:59.000 [info] extend_info_from_node(): Including Ed25519 ID for $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46
  309. Jan 01 03:45:59.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46'
  310. Jan 01 03:45:59.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  311. Jan 01 03:45:59.000 [info] internal (high-uptime) circ (length 3, last hop charon): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $78C4FCE0851C99A4E05563C6F520C68F28BD916E(closed) $7C5E843AD82EF7F3CC95099161DD1771B3ADB925(closed)
  312. Jan 01 03:45:59.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  313. Jan 01 03:45:59.000 [info] connection_handle_listener_read(): New SOCKS connection opened from 127.0.0.1.
  314. Jan 01 03:45:59.000 [info] rep_hist_note_used_port(): New port prediction added. Will continue predictive circ building for 2726 more seconds.
  315. Jan 01 03:45:59.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
  316. Jan 01 03:45:59.000 [info] exit circ (length 3): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $844AE9CAD04325E955E2BE1521563B79FE7094B7(open) $335746A6DEB684FABDF3FC5835C3898F05C5A5A8(open)
  317. Jan 01 03:45:59.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
  318. Jan 01 03:45:59.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 0 on circ 2920257441 to begin stream 24380.
  319. Jan 01 03:45:59.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket 764, n_circ_id 2920257441
  320. Jan 01 03:45:59.000 [info] connection_ap_handshake_send_begin(): Sending up to 193 + 0 bytes of queued-up data
  321. Jan 01 03:45:59.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 98.000000/104.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  322. Jan 01 03:45:59.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  323. Jan 01 03:45:59.000 [info] internal (high-uptime) circ (length 3, last hop charon): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $78C4FCE0851C99A4E05563C6F520C68F28BD916E(open) $7C5E843AD82EF7F3CC95099161DD1771B3ADB925(closed)
  324. Jan 01 03:45:59.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  325. Jan 01 03:46:00.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  326. Jan 01 03:46:00.000 [info] internal (high-uptime) circ (length 3, last hop charon): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $78C4FCE0851C99A4E05563C6F520C68F28BD916E(open) $7C5E843AD82EF7F3CC95099161DD1771B3ADB925(open)
  327. Jan 01 03:46:00.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  328. Jan 01 03:46:00.000 [info] circuit_build_times_get_xm(): Xm mode #0: 525 16
  329. Jan 01 03:46:00.000 [info] circuit_build_times_set_timeout(): Set buildtimeout to low value 991.343102ms. Setting to 5000ms
  330. Jan 01 03:46:00.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 5s (5000.000000ms, 60000.000000ms, Xm: 525, a: 2.531907, r: 0.018519) based on 108 circuit times
  331. Jan 01 03:46:00.000 [info] circuit_send_next_onion_skin(): circuit built!
  332. Jan 01 03:46:00.000 [info] pathbias_count_build_success(): Got success count 99.000000/104.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  333. Jan 01 03:46:00.000 [info] circuit_predict_and_launch_new(): Have 3 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
  334. Jan 01 03:46:00.000 [info] origin_circuit_new(): Circuit 5 chose an idle timeout of 2852 based on 2725 seconds of predictive building remaining.
  335. Jan 01 03:46:00.000 [info] extend_info_from_node(): Including Ed25519 ID for $3FE1F6A1E6C08B0B5F41FB0A97CA97480E5A1F13~KingKong at 188.241.58.222
  336. Jan 01 03:46:00.000 [info] select_entry_guard_for_circuit(): Selected primary guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1) for circuit.
  337. Jan 01 03:46:00.000 [info] extend_info_from_node(): Including Ed25519 ID for $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46
  338. Jan 01 03:46:00.000 [info] extend_info_from_node(): Including Ed25519 ID for $4436A57FFE36F09368718BCFFF750EB86A4E00B9~torpidsFRdigicube at 95.130.11.15
  339. Jan 01 03:46:00.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$EA8CEAA8939F20108D4388B6EAE867A5AC6442C1~TORdashRELAYdotUS at 50.21.183.46'
  340. Jan 01 03:46:00.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 2920257441 streamid 24380 after 1 seconds.
  341. Jan 01 03:46:00.000 [info] addressmap_register(): Addressmap: (re)mapped '[scrubbed]' to '[scrubbed]'
  342. Jan 01 03:46:00.000 [info] exit circ (length 3): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $844AE9CAD04325E955E2BE1521563B79FE7094B7(open) $335746A6DEB684FABDF3FC5835C3898F05C5A5A8(open)
  343. Jan 01 03:46:00.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  344. Jan 01 03:46:00.000 [info] internal (high-uptime) circ (length 3, last hop KingKong): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $4436A57FFE36F09368718BCFFF750EB86A4E00B9(closed) $3FE1F6A1E6C08B0B5F41FB0A97CA97480E5A1F13(closed)
  345. Jan 01 03:46:00.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  346. Jan 01 03:46:00.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 99.000000/105.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  347. Jan 01 03:46:00.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  348. Jan 01 03:46:00.000 [info] internal (high-uptime) circ (length 3, last hop KingKong): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $4436A57FFE36F09368718BCFFF750EB86A4E00B9(open) $3FE1F6A1E6C08B0B5F41FB0A97CA97480E5A1F13(closed)
  349. Jan 01 03:46:00.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
  350. Jan 01 03:46:01.000 [info] circuit_finish_handshake(): Finished building circuit hop:
  351. Jan 01 03:46:01.000 [info] internal (high-uptime) circ (length 3, last hop KingKong): $EA8CEAA8939F20108D4388B6EAE867A5AC6442C1(open) $4436A57FFE36F09368718BCFFF750EB86A4E00B9(open) $3FE1F6A1E6C08B0B5F41FB0A97CA97480E5A1F13(open)
  352. Jan 01 03:46:01.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  353. Jan 01 03:46:01.000 [info] circuit_build_times_get_xm(): Xm mode #0: 525 16
  354. Jan 01 03:46:01.000 [info] circuit_build_times_set_timeout(): Set buildtimeout to low value 990.165526ms. Setting to 5000ms
  355. Jan 01 03:46:01.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 5s (5000.000000ms, 60000.000000ms, Xm: 525, a: 2.536650, r: 0.018349) based on 109 circuit times
  356. Jan 01 03:46:01.000 [info] circuit_send_next_onion_skin(): circuit built!
  357. Jan 01 03:46:01.000 [info] pathbias_count_build_success(): Got success count 100.000000/105.000000 for guard TORdashRELAYdotUS ($EA8CEAA8939F20108D4388B6EAE867A5AC6442C1)
  358. Jan 01 03:46:06.000 [info] connection_edge_reached_eof(): conn (fd 764) reached eof. Closing.
  359. Jan 01 03:46:06.000 [info] connection_edge_process_relay_cell(): end cell (closed normally) dropped, unknown stream.
  360. Jan 01 03:46:46.000 [info] routerlist_remove_old_routers(): We have 6205 live routers and 0 old router descriptors.
  361. Jan 01 03:46:46.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 6205 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
  362. Jan 01 03:46:46.000 [info] launch_descriptor_downloads(): Launching 1 request for 3 routerdescs, 4 at a time
  363. Jan 01 03:46:46.000 [info] handle_response_fetch_desc(): Received server info (body size 0) from server '204.13.164.118:80'
  364. Jan 01 03:46:46.000 [info] handle_response_fetch_desc(): Received http status code 404 ("Servers unavailable") from server '204.13.164.118:80' while fetching "/tor/server/d/4119196142F99F55ED1715156D55E9D460C6BA28+5A6741A9BD4A7EAE1DF800E64DB9D8EF1B89CE6E+A7C2F7D5B0549613724712425F9A05093F81748A.z". I'll try again soon.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement