Advertisement
Guest User

Untitled

a guest
Jul 5th, 2017
342
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.36 KB | None | 0 0
  1. Jul 05 18:25:18.000 [notice] Tor 0.3.0.9 (git-22b3bf094e327093) opening log file.
  2. Jul 05 18:25:18.671 [notice] Tor 0.3.0.9 (git-22b3bf094e327093) running on Windows 8 with Libevent 2.0.22-stable, OpenSSL 1.0.2k and Zlib 1.2.8.
  3. Jul 05 18:25:18.671 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
  4. Jul 05 18:25:18.671 [notice] Read configuration file "C:\TorBrowser\Browser\TorBrowser\Data\Tor\torrc-defaults".
  5. Jul 05 18:25:18.671 [notice] Read configuration file "C:\TorBrowser\Browser\TorBrowser\Data\Tor\torrc".
  6. Jul 05 18:25:18.687 [warn] The CacheDNS option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  7. Jul 05 18:25:18.687 [warn] The UseDNSCache option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  8. Jul 05 18:25:18.687 [warn] The CacheDNS option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  9. Jul 05 18:25:18.687 [warn] The UseDNSCache option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  10. Jul 05 18:25:18.687 [notice] Opening Socks listener on 127.0.0.1:9051
  11. Jul 05 18:25:18.687 [notice] Opening Socks listener on 127.0.0.1:9150
  12. Jul 05 18:25:18.687 [notice] Opening Control listener on 127.0.0.1:9151
  13. Jul 05 18:25:18.000 [notice] Parsing GEOIP IPv4 file C:\TorBrowser\Browser\TorBrowser\Data\Tor\geoip.
  14. Jul 05 18:25:19.000 [notice] Parsing GEOIP IPv6 file C:\TorBrowser\Browser\TorBrowser\Data\Tor\geoip6.
  15. Jul 05 18:25:19.000 [notice] Bootstrapped 0%: Starting
  16. Jul 05 18:25:20.000 [notice] Starting with guard context "bridges"
  17. Jul 05 18:25:20.000 [notice] new bridge descriptor 'Unnamed' (cached): <<some bridge info>>
  18. Jul 05 18:25:20.000 [notice] new bridge descriptor 'soddennessesdeco' (cached): <<some bridge info>>
  19. Jul 05 18:25:20.000 [notice] Bridge 'Unnamed' has both an IPv4 and an IPv6 address. Will prefer using its IPv4 address (<<some bridge info>>) based on the configured Bridge address.
  20. Jul 05 18:25:20.000 [notice] new bridge descriptor 'Unnamed' (cached): <<some bridge info>>
  21. Jul 05 18:25:20.000 [notice] new bridge descriptor 'Unnamed' (cached): <<some bridge info>>
  22. Jul 05 18:25:20.000 [notice] new bridge descriptor 'Unnamed' (cached): <<some bridge info>>
  23. Jul 05 18:25:20.000 [notice] new bridge descriptor 'soddennessesdeco' (cached): <<some bridge info>>
  24. Jul 05 18:25:20.000 [notice] new bridge descriptor 'soddennessesdeco' (cached): <<some bridge info>>
  25. Jul 05 18:25:20.000 [notice] new bridge descriptor 'soddennessesdeco' (cached): <<some bridge info>>
  26. Jul 05 18:25:20.000 [notice] Bridge 'Unnamed' has both an IPv4 and an IPv6 address. Will prefer using its IPv4 address (<<some bridge info>>) based on the configured Bridge address.
  27. Jul 05 18:25:20.000 [notice] new bridge descriptor 'Unnamed' (cached): <<some bridge info>>
  28. Jul 05 18:25:20.000 [notice] Bridge 'Unnamed' has both an IPv4 and an IPv6 address. Will prefer using its IPv4 address (<<some bridge info>>) based on the configured Bridge address.
  29. Jul 05 18:25:20.000 [notice] new bridge descriptor 'Unnamed' (cached): <<some bridge info>>
  30. Jul 05 18:25:20.000 [notice] Bootstrapped 80%: Connecting to the Tor network
  31. Jul 05 18:25:20.000 [notice] New control connection opened from 127.0.0.1.
  32. Jul 05 18:25:27.000 [warn] The CacheDNS option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  33. Jul 05 18:25:27.000 [warn] The UseDNSCache option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  34. Jul 05 18:25:27.000 [warn] The CacheDNS option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  35. Jul 05 18:25:27.000 [warn] The UseDNSCache option is deprecated, and will most likely be removed in a future version of Tor. Client-side DNS cacheing enables a wide variety of route-capture attacks. If a single bad exit node lies to you about an IP address, cacheing that address would make you visit an address of the attacker's choice every time you connected to your destination. (If you think this is a mistake, please let us know!)
  36. Jul 05 18:25:27.000 [notice] Tor 0.3.0.9 (git-22b3bf094e327093) opening log file.
  37. Jul 05 18:25:27.000 [notice] New control connection opened from 127.0.0.1.
  38. Jul 05 18:25:27.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
  39. Jul 05 18:25:28.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
  40. Jul 05 18:25:28.000 [notice] new bridge descriptor 'soddennessesdeco' (fresh): <<some bridge info>>
  41. Jul 05 18:25:29.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
  42. Jul 05 18:25:29.000 [notice] Bootstrapped 100%: Done
  43. Jul 05 18:25:29.000 [notice] new bridge descriptor 'Unnamed' (fresh): <<some bridge info>>
  44. Jul 05 18:25:30.000 [notice] New control connection opened from 127.0.0.1.
  45. Jul 05 18:25:30.000 [notice] New control connection opened from 127.0.0.1.
  46. Jul 05 18:27:33.000 [warn] Rejecting SOCKS request for anonymous connection to private address [scrubbed].
  47. Jul 05 18:27:33.000 [warn] socks5: command 3 not recognized. Rejecting.
  48. Jul 05 18:27:33.000 [warn] socks5: command 3 not recognized. Rejecting.
  49. Jul 05 18:27:35.000 [warn] Missing mapping for virtual address '[scrubbed]'. Refusing.
  50. Jul 05 18:27:36.000 [warn] socks5: command 3 not recognized. Rejecting.
  51. Jul 05 18:27:38.000 [warn] Missing mapping for virtual address '[scrubbed]'. Refusing.
  52. Jul 05 18:27:39.000 [warn] socks5: command 3 not recognized. Rejecting.
  53. Jul 05 18:27:42.000 [warn] socks5: command 3 not recognized. Rejecting.
  54. Jul 05 18:27:42.000 [warn] Missing mapping for virtual address '[scrubbed]'. Refusing.
  55. Jul 05 18:27:45.000 [warn] socks5: command 3 not recognized. Rejecting.
  56. Jul 05 18:27:45.000 [warn] Missing mapping for virtual address '[scrubbed]'. Refusing.
  57. Jul 05 18:27:48.000 [warn] socks5: command 3 not recognized. Rejecting.
  58. Jul 05 18:27:51.000 [notice] Have tried resolving or connecting to address '[scrubbed]' at 3 different places. Giving up.
  59. Jul 05 18:27:51.000 [warn] socks5: command 3 not recognized. Rejecting.
  60. Jul 05 18:27:54.000 [warn] socks5: command 3 not recognized. Rejecting.
  61. Jul 05 18:27:57.000 [warn] socks5: command 3 not recognized. Rejecting.
  62. Jul 05 18:27:57.000 [warn] Missing mapping for virtual address '[scrubbed]'. Refusing.
  63. Jul 05 18:27:57.000 [notice] Have tried resolving or connecting to address '[scrubbed]' at 3 different places. Giving up.
  64. Jul 05 18:28:00.000 [warn] socks5: command 3 not recognized. Rejecting.
  65. Jul 05 18:28:01.000 [warn] Missing mapping for virtual address '[scrubbed]'. Refusing.
  66. Jul 05 18:28:03.000 [warn] socks5: command 3 not recognized. Rejecting.
  67. Jul 05 18:28:06.000 [warn] socks5: command 3 not recognized. Rejecting.
  68. Jul 05 18:28:09.000 [warn] socks5: command 3 not recognized. Rejecting.
  69. Jul 05 18:28:10.000 [notice] Have tried resolving or connecting to address '[scrubbed]' at 3 different places. Giving up.
  70. Jul 05 18:28:10.000 [notice] Have tried resolving or connecting to address '[scrubbed]' at 3 different places. Giving up.
  71. Jul 05 18:28:12.000 [warn] socks5: command 3 not recognized. Rejecting.
  72. Jul 05 18:28:15.000 [warn] socks5: command 3 not recognized. Rejecting.
  73. Jul 05 18:28:31.000 [notice] Owning controller connection has closed -- exiting now.
  74. Jul 05 18:28:31.000 [notice] Catching signal TERM, exiting cleanly.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement