Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Feb 17 03:50:43.000 [notice] Tor 0.2.9.14 (git-a211f886ad759cab) opening new log file.
- Feb 17 03:50:43.654 [notice] Tor 0.2.9.14 (git-a211f886ad759cab) running on Linux with Libevent 2.0.21-stable, OpenSSL 1.1.0f and Zlib 1.2.8.
- Feb 17 03:50:43.660 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
- Feb 17 03:50:43.660 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
- Feb 17 03:50:43.661 [notice] Read configuration file "/etc/tor/torrc".
- Feb 17 03:50:43.717 [notice] Based on detected system memory, MaxMemInQueues is set to 325 MB. You can override this by setting MaxMemInQueues by hand.
- Feb 17 03:50:43.736 [notice] Opening Socks listener on 127.0.0.1:9050
- Feb 17 03:50:43.741 [notice] Opening Control listener on 127.0.0.1:9051
- Feb 17 03:50:43.741 [notice] Opening OR listener on 0.0.0.0:9001
- Feb 17 03:50:43.741 [notice] Opening Directory listener on 0.0.0.0:9030
- Feb 17 03:50:43.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
- Feb 17 03:50:43.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh 65440, ConnLimit_low_thresh 49128
- Feb 17 03:50:43.000 [notice] Not disabling debugger attaching for unprivileged users.
- Feb 17 03:50:43.000 [info] tor_lockfile_lock(): Locking "/var/lib/tor/lock"
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 278.645508/295.100098 path bias for node Unnamed
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 98.334559/98.334559 path use bias for node Unnamed
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 17.000000/17.000000 path bias for node ZaeziPfupf
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 15.000000/15.000000 path use bias for node ZaeziPfupf
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 9.000000/9.000000 path bias for node Autumn
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 6.000000/6.000000 path use bias for node Autumn
- Feb 17 03:50:43.000 [info] or_state_load(): Loaded state from "/var/lib/tor/state"
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 278.645508/295.100098 path bias for node Unnamed
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 98.334559/98.334559 path use bias for node Unnamed
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 17.000000/17.000000 path bias for node ZaeziPfupf
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 15.000000/15.000000 path use bias for node ZaeziPfupf
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 9.000000/9.000000 path bias for node Autumn
- Feb 17 03:50:43.000 [info] entry_guards_parse_state(): Read 6.000000/6.000000 path use bias for node Autumn
- Feb 17 03:50:43.000 [info] circuit_build_times_parse_state(): Adding 10 timeouts.
- Feb 17 03:50:43.000 [info] circuit_build_times_parse_state(): Loaded 1000/1000 values from 228 lines in circuit time histogram
- Feb 17 03:50:43.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
- Feb 17 03:50:43.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
- Feb 17 03:50:43.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4775 27
- Feb 17 03:50:44.000 [info] circuit_build_times_set_timeout(): Based on 1000 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 7 seconds.
- Feb 17 03:50:44.000 [info] circuit_build_times_set_timeout(): Circuit timeout data: 6844.496386ms, 60000.000000ms, Xm: 4772, a: 4.462240, r: 0.140000
- Feb 17 03:50:44.000 [info] read_file_to_str(): Could not open "/var/lib/tor/router-stability": No such file or directory
- Feb 17 03:50:44.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/var/run/tor/control.authcookie"'.
- Feb 17 03:50:44.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
- Feb 17 03:50:44.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
- Feb 17 03:50:47.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
- Feb 17 03:50:49.000 [info] options_act(): Configured to measure hidden service statistics.
- Feb 17 03:50:49.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
- Feb 17 03:50:49.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: config change
- Feb 17 03:50:49.000 [info] crypto_global_init(): NOT using OpenSSL engine support.
- Feb 17 03:50:49.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
- Feb 17 03:50:49.000 [info] configure_nameservers(): Parsing resolver configuration in '/etc/resolv.conf'
- Feb 17 03:50:49.000 [info] eventdns: Parsing resolv.conf file /etc/resolv.conf
- Feb 17 03:50:49.000 [info] eventdns: Added nameserver 192.168.2.1:53 as 0x1ccd298
- Feb 17 03:50:49.000 [info] eventdns: Setting maximum allowed timeouts to 255
- Feb 17 03:50:49.000 [info] eventdns: Setting retries to 1
- Feb 17 03:50:49.000 [info] eventdns: Setting maximum inflight requests to 8192
- Feb 17 03:50:49.000 [info] eventdns: Setting timeout to 5
- Feb 17 03:50:49.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:50:49.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:50:49.000 [info] init_keys(): Reading/making identity key "/var/lib/tor/keys/secret_id_key"...
- Feb 17 03:50:49.000 [info] init_key_from_file(): No key found in "/var/lib/tor/keys/secret_id_key"; generating fresh key.
- Feb 17 03:50:50.000 [info] init_key_from_file(): Generated key seems valid
- Feb 17 03:50:50.000 [notice] You are running a new relay. Thanks for helping the Tor network! If you wish to know what will happen in the upcoming weeks regarding its usage, have a look at https://blog.torproject.org/blog/lifecycle-of-a-new-relay
- Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_signing_secret_key": No such file or directory
- Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_signing_public_key": No such file or directory
- Feb 17 03:50:50.000 [info] No key found in /var/lib/tor/keys/ed25519_signing_secret_key.
- Feb 17 03:50:50.000 [notice] It looks like I need to generate and sign a new medium-term signing key, because I don't have one. To do that, I need to load (or create) the permanent master identity key.
- Feb 17 03:50:50.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:50:50.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_master_id_secret_key": No such file or directory
- Feb 17 03:50:50.000 [info] read_file_to_str(): Could not open "/var/lib/tor/keys/ed25519_master_id_public_key": No such file or directory
- Feb 17 03:50:50.000 [info] init_keys(): Reading/making onion key "/var/lib/tor/keys/secret_onion_key"...
- Feb 17 03:50:50.000 [info] init_key_from_file(): No key found in "/var/lib/tor/keys/secret_onion_key"; generating fresh key.
- Feb 17 03:50:51.000 [info] init_key_from_file(): Generated key seems valid
- Feb 17 03:50:51.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: set onion key
- Feb 17 03:50:51.000 [info] init_curve25519_keypair_from_file(): No key found in "/var/lib/tor/keys/secret_onion_key_ntor"; generating fresh key.
- Feb 17 03:50:54.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:50:54.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:50:54.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:50:54.000 [info] router_write_fingerprint(): Dumping fingerprint to "/var/lib/tor/fingerprint"...
- Feb 17 03:50:54.000 [notice] Your Tor server's identity key fingerprint is 'RoteServerPaul C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5'
- Feb 17 03:50:54.000 [notice] Bootstrapped 0%: Starting
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dannenberg with signing key E66AE3C828CCAA8A765620B2750DD6257C9A52D4
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority gabelmoo with signing key 5D593E8FD0BCC5C0DA732B91FC0E5E1AFEC0141D
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority tor26 with signing key 6AEC757516B142855BCE29708EBDA965AC3DD06A
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority maatuska with signing key C9C96501FD35732C45C424B74CC32739991B1F51
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority Faravahar with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC
- Feb 17 03:50:54.000 [info] trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
- Feb 17 03:50:56.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
- Feb 17 03:50:56.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live ns consensus will be the most recent until 2018-02-17 04:00:00 and will expire at 2018-02-17 06:00:00; fetching the next one at 2018-02-17 04:07:13.
- Feb 17 03:50:56.000 [info] update_consensus_networkstatus_fetch_time_impl(): No live microdesc consensus; we should fetch one immediately.
- Feb 17 03:50:56.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
- Feb 17 03:50:58.000 [info] read_file_to_str(): Could not open "/var/lib/tor/unverified-consensus": No such file or directory
- Feb 17 03:50:59.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 9 (dannenberg tor26 longclaw bastet maatuska moria1 dizum gabelmoo Faravahar).
- Feb 17 03:51:01.000 [info] read_file_to_str(): Could not open "/var/lib/tor/unverified-microdesc-consensus": No such file or directory
- Feb 17 03:51:01.000 [info] routers_update_all_from_networkstatus(): The directory authorities say my version is ok.
- Feb 17 03:51:07.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 12601 descriptors.
- Feb 17 03:51:07.000 [info] microdesc_cache_clean(): Removed 1131/12601 microdescriptors as old.
- Feb 17 03:55:35.000 [info] router_load_routers_from_string(): 20066 elements to add
- Feb 17 03:55:38.000 [info] routerlist_remove_old_routers(): We have 871 live routers and 19159 old router descriptors.
- Feb 17 03:55:38.000 [info] tor_mmap_file(): Could not open "/var/lib/tor/cached-extrainfo" for mmap(): No such file or directory
- Feb 17 03:55:38.000 [notice] Bootstrapped 45%: Asking for relay descriptors
- Feb 17 03:55:38.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
- Feb 17 03:55:38.000 [info] update_consensus_router_descriptor_downloads(): 5126 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
- Feb 17 03:55:38.000 [info] launch_descriptor_downloads(): Launching 54 requests for 5126 routerdescs, 96 at a time
- Feb 17 03:55:38.000 [info] launch_descriptor_downloads(): Launching 3 requests for 37 microdescs, 13 at a time
- Feb 17 03:55:38.000 [notice] Signaled readiness to systemd
- Feb 17 03:55:38.000 [info] channel_register(): Channel 0x36f5938 (global ID 1) in state opening (1) registered with no identity digest
- Feb 17 03:55:39.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
- Feb 17 03:55:39.000 [info] routerlist_remove_old_routers(): We have 871 live routers and 14259 old router descriptors.
- Feb 17 03:55:39.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
- Feb 17 03:55:39.000 [info] directory_send_command(): Downloading consensus from 204.13.164.118 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
- Feb 17 03:55:39.000 [notice] Opening Socks listener on /var/run/tor/socks
- Feb 17 03:55:39.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:55:39.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:55:39.000 [notice] Opening Control listener on /var/run/tor/control
- Feb 17 03:55:39.000 [info] tor_getpwnam(): Caching new entry debian-tor for debian-tor
- Feb 17 03:55:39.000 [info] channel_register(): Channel 0x47b03d0 (global ID 2) in state opening (1) registered with no identity digest
- Feb 17 03:55:39.000 [info] channel_register(): Channel 0x522b038 (global ID 3) in state opening (1) registered with no identity digest
- Feb 17 03:55:39.000 [info] channel_register(): Channel 0x2d4a3e0 (global ID 4) in state opening (1) registered with no identity digest
- Feb 17 03:55:39.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:39.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:39.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:39.000 [notice] Guessed our IP address as 92.75.246.198 (source: 86.59.21.38).
- Feb 17 03:55:39.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: IP address changed
- Feb 17 03:55:39.000 [info] connection_dir_client_reached_eof(): Received answer to microdescriptor request (status 200, size 5000) from server '86.59.21.38:80'
- Feb 17 03:55:40.000 [notice] Bootstrapped 50%: Loading relay descriptors
- Feb 17 03:55:40.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
- Feb 17 03:55:40.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
- Feb 17 03:55:40.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:37485; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:55:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:40.000 [info] router_rebuild_descriptor(): Rebuilding relay descriptor
- Feb 17 03:55:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:55:40.000 [info] extrainfo_dump_to_string(): Adding stats to extra-info descriptor.
- Feb 17 03:55:40.000 [info] or_state_save(): Saved state to "/var/lib/tor/state"
- Feb 17 03:55:40.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:49201; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:55:40.000 [info] Received http status code 304 ("Not modified") from server '204.13.164.118:80' while fetching consensus directory.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:40.000 [info] connection_dir_client_reached_eof(): Received answer to microdescriptor request (status 200, size 5596) from server '204.13.164.118:80'
- Feb 17 03:55:41.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
- Feb 17 03:55:41.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
- Feb 17 03:55:41.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:41.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:41.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:41.000 [info] connection_dir_client_reached_eof(): Received answer to microdescriptor request (status 200, size 5564) from server '128.31.0.34:9131'
- Feb 17 03:55:41.000 [info] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 869/5979, and can only build 0% of likely paths. (We have 14% of guards bw, 13% of midpoint bw, and 12% of exit bw = 0% of path bw.)
- Feb 17 03:55:41.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 871 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5126 in progress.
- Feb 17 03:55:41.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:48444; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:55:41.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:39484; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:55:41.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:41.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:41.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:41.000 [info] connection_dir_client_reached_eof(): Received server info (size 89694) from server '128.31.0.34:9131'
- Feb 17 03:55:42.000 [info] router_load_routers_from_string(): 38 elements to add
- Feb 17 03:55:42.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 907/5979, and can only build 0% of likely paths. (We have 15% of guards bw, 14% of midpoint bw, and 13% of exit bw = 0% of path bw.)
- Feb 17 03:55:42.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 909 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 5088 in progress.
- Feb 17 03:55:42.000 [info] connection_dir_client_reached_eof(): Received 38/38 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:55:42.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:42.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:42.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:42.000 [info] connection_dir_client_reached_eof(): Received server info (size 226224) from server '86.59.21.38:80'
- Feb 17 03:55:44.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:55:44.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1002/5979, and can only build 0% of likely paths. (We have 17% of guards bw, 16% of midpoint bw, and 13% of exit bw = 0% of path bw.)
- Feb 17 03:55:44.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 1004 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4993 in progress.
- Feb 17 03:55:44.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 86.59.21.38:80
- Feb 17 03:55:44.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:44.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:44.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:44.000 [info] connection_dir_client_reached_eof(): Received server info (size 220634) from server '193.23.244.244:80'
- Feb 17 03:55:45.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:45.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
- Feb 17 03:55:46.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1096/5979, and can only build 0% of likely paths. (We have 18% of guards bw, 17% of midpoint bw, and 14% of exit bw = 0% of path bw.)
- Feb 17 03:55:46.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 1 delayed; 1099 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4897 in progress.
- Feb 17 03:55:46.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 193.23.244.244:80
- Feb 17 03:55:46.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:46.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:46.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:46.000 [info] connection_dir_client_reached_eof(): Received server info (size 220125) from server '199.58.81.140:80'
- Feb 17 03:55:47.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:48.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1192/5979, and can only build 0% of likely paths. (We have 20% of guards bw, 19% of midpoint bw, and 15% of exit bw = 0% of path bw.)
- Feb 17 03:55:48.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 0 delayed; 1195 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4800 in progress.
- Feb 17 03:55:48.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 199.58.81.140:80
- Feb 17 03:55:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 218305) from server '194.109.206.212:80'
- Feb 17 03:55:49.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:49.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1287/5979, and can only build 0% of likely paths. (We have 21% of guards bw, 20% of midpoint bw, and 16% of exit bw = 0% of path bw.)
- Feb 17 03:55:49.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 0 delayed; 1291 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4704 in progress.
- Feb 17 03:55:49.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 194.109.206.212:80
- Feb 17 03:55:49.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:49.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:49.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:49.000 [info] connection_dir_client_reached_eof(): Received server info (size 214849) from server '128.31.0.34:9131'
- Feb 17 03:55:51.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:55:51.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1382/5979, and can only build 0% of likely paths. (We have 23% of guards bw, 22% of midpoint bw, and 17% of exit bw = 0% of path bw.)
- Feb 17 03:55:51.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 0 delayed; 1386 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4609 in progress.
- Feb 17 03:55:51.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:55:51.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:51.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:51.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:51.000 [info] connection_dir_client_reached_eof(): Received server info (size 222739) from server '128.31.0.34:9131'
- Feb 17 03:55:52.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:53.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1478/5979, and can only build 1% of likely paths. (We have 25% of guards bw, 23% of midpoint bw, and 18% of exit bw = 1% of path bw.)
- Feb 17 03:55:53.000 [info] update_consensus_router_descriptor_downloads(): 2 router descriptors downloadable. 1 delayed; 1482 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4512 in progress.
- Feb 17 03:55:53.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:55:53.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:53.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:53.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:53.000 [info] connection_dir_client_reached_eof(): Received server info (size 223163) from server '128.31.0.34:9131'
- Feb 17 03:55:54.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:54.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1574/5979, and can only build 1% of likely paths. (We have 26% of guards bw, 24% of midpoint bw, and 22% of exit bw = 1% of path bw.)
- Feb 17 03:55:54.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1578 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4416 in progress.
- Feb 17 03:55:54.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:55:54.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:54.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:54.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:54.000 [info] connection_dir_client_reached_eof(): Received server info (size 222845) from server '128.31.0.34:9131'
- Feb 17 03:55:56.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:56.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1670/5979, and can only build 1% of likely paths. (We have 27% of guards bw, 26% of midpoint bw, and 24% of exit bw = 1% of path bw.)
- Feb 17 03:55:56.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1674 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4320 in progress.
- Feb 17 03:55:56.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:55:56.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:56.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:56.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:56.000 [info] connection_dir_client_reached_eof(): Received server info (size 223348) from server '128.31.0.34:9131'
- Feb 17 03:55:57.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:58.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1766/5979, and can only build 1% of likely paths. (We have 28% of guards bw, 27% of midpoint bw, and 25% of exit bw = 1% of path bw.)
- Feb 17 03:55:58.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1770 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4224 in progress.
- Feb 17 03:55:58.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:55:58.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:55:58.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:55:58.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:55:58.000 [info] connection_dir_client_reached_eof(): Received server info (size 224058) from server '128.31.0.34:9131'
- Feb 17 03:55:59.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:55:59.000 [info] Bootstrapped 51%: Loading relay descriptors
- Feb 17 03:55:59.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1862/5979, and can only build 2% of likely paths. (We have 29% of guards bw, 29% of midpoint bw, and 26% of exit bw = 2% of path bw.)
- Feb 17 03:56:00.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1866 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4128 in progress.
- Feb 17 03:56:00.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:00.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:00.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:00.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:00.000 [info] connection_dir_client_reached_eof(): Received server info (size 221118) from server '128.31.0.34:9131'
- Feb 17 03:56:01.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:01.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 1958/5979, and can only build 2% of likely paths. (We have 32% of guards bw, 31% of midpoint bw, and 27% of exit bw = 2% of path bw.)
- Feb 17 03:56:01.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 1962 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 4032 in progress.
- Feb 17 03:56:01.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:01.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:01.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:01.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:01.000 [info] connection_dir_client_reached_eof(): Received server info (size 226035) from server '128.31.0.34:9131'
- Feb 17 03:56:03.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:03.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2054/5979, and can only build 3% of likely paths. (We have 34% of guards bw, 32% of midpoint bw, and 27% of exit bw = 3% of path bw.)
- Feb 17 03:56:03.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2058 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3936 in progress.
- Feb 17 03:56:03.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:03.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:03.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:03.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:03.000 [info] connection_dir_client_reached_eof(): Received server info (size 220748) from server '128.31.0.34:9131'
- Feb 17 03:56:04.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:05.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2150/5979, and can only build 3% of likely paths. (We have 35% of guards bw, 33% of midpoint bw, and 28% of exit bw = 3% of path bw.)
- Feb 17 03:56:05.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2154 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3840 in progress.
- Feb 17 03:56:05.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:05.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:05.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:05.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:05.000 [info] connection_dir_client_reached_eof(): Received server info (size 230508) from server '171.25.193.9:443'
- Feb 17 03:56:06.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:06.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2245/5979, and can only build 4% of likely paths. (We have 37% of guards bw, 34% of midpoint bw, and 31% of exit bw = 4% of path bw.)
- Feb 17 03:56:06.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2250 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3744 in progress.
- Feb 17 03:56:06.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 171.25.193.9:443
- Feb 17 03:56:06.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:06.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:06.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:06.000 [info] connection_dir_client_reached_eof(): Received server info (size 229945) from server '131.188.40.189:80'
- Feb 17 03:56:08.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:08.000 [info] Bootstrapped 52%: Loading relay descriptors
- Feb 17 03:56:08.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2340/5979, and can only build 4% of likely paths. (We have 39% of guards bw, 37% of midpoint bw, and 32% of exit bw = 4% of path bw.)
- Feb 17 03:56:08.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2346 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3648 in progress.
- Feb 17 03:56:08.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 131.188.40.189:80
- Feb 17 03:56:08.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:08.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:08.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:08.000 [info] connection_dir_client_reached_eof(): Received server info (size 240653) from server '128.31.0.34:9131'
- Feb 17 03:56:10.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:10.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2436/5979, and can only build 5% of likely paths. (We have 40% of guards bw, 39% of midpoint bw, and 33% of exit bw = 5% of path bw.)
- Feb 17 03:56:10.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2442 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3552 in progress.
- Feb 17 03:56:10.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:10.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:10.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:10.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:10.000 [info] connection_dir_client_reached_eof(): Received server info (size 228672) from server '154.35.175.225:80'
- Feb 17 03:56:11.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:12.000 [info] Bootstrapped 53%: Loading relay descriptors
- Feb 17 03:56:12.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2532/5979, and can only build 6% of likely paths. (We have 42% of guards bw, 41% of midpoint bw, and 35% of exit bw = 6% of path bw.)
- Feb 17 03:56:12.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2538 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3456 in progress.
- Feb 17 03:56:12.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 154.35.175.225:80
- Feb 17 03:56:12.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:12.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:12.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:12.000 [info] connection_dir_client_reached_eof(): Received server info (size 230989) from server '128.31.0.34:9131'
- Feb 17 03:56:14.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:14.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2628/5979, and can only build 7% of likely paths. (We have 45% of guards bw, 43% of midpoint bw, and 36% of exit bw = 7% of path bw.)
- Feb 17 03:56:14.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2634 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3360 in progress.
- Feb 17 03:56:14.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:14.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:14.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:14.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:14.000 [info] connection_dir_client_reached_eof(): Received server info (size 238447) from server '128.31.0.34:9131'
- Feb 17 03:56:16.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:16.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2724/5979, and can only build 7% of likely paths. (We have 47% of guards bw, 45% of midpoint bw, and 36% of exit bw = 7% of path bw.)
- Feb 17 03:56:16.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2730 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3264 in progress.
- Feb 17 03:56:16.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:16.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:16.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:16.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:16.000 [info] connection_dir_client_reached_eof(): Received server info (size 228170) from server '128.31.0.34:9131'
- Feb 17 03:56:17.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:18.000 [info] Bootstrapped 54%: Loading relay descriptors
- Feb 17 03:56:18.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2820/5979, and can only build 8% of likely paths. (We have 48% of guards bw, 47% of midpoint bw, and 37% of exit bw = 8% of path bw.)
- Feb 17 03:56:18.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2826 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3168 in progress.
- Feb 17 03:56:18.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:18.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:18.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:18.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:18.000 [info] connection_dir_client_reached_eof(): Received server info (size 238773) from server '128.31.0.34:9131'
- Feb 17 03:56:19.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:20.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 2915/5979, and can only build 9% of likely paths. (We have 50% of guards bw, 48% of midpoint bw, and 40% of exit bw = 9% of path bw.)
- Feb 17 03:56:20.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 2922 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 3072 in progress.
- Feb 17 03:56:20.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:20.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:20.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:20.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:20.000 [info] connection_dir_client_reached_eof(): Received server info (size 231436) from server '128.31.0.34:9131'
- Feb 17 03:56:21.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:21.000 [notice] Bootstrapped 55%: Loading relay descriptors
- Feb 17 03:56:21.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3011/5979, and can only build 10% of likely paths. (We have 51% of guards bw, 50% of midpoint bw, and 41% of exit bw = 10% of path bw.)
- Feb 17 03:56:21.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 3018 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2976 in progress.
- Feb 17 03:56:21.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:21.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:21.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:21.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:21.000 [info] connection_dir_client_reached_eof(): Received server info (size 236704) from server '128.31.0.34:9131'
- Feb 17 03:56:23.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:56:23.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3106/5979, and can only build 12% of likely paths. (We have 53% of guards bw, 52% of midpoint bw, and 43% of exit bw = 12% of path bw.)
- Feb 17 03:56:23.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 0 delayed; 3113 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2881 in progress.
- Feb 17 03:56:23.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:23.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 1 delayed; 3113 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2880 in progress.
- Feb 17 03:56:23.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:23.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:23.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:23.000 [info] connection_dir_client_reached_eof(): Received server info (size 227787) from server '128.31.0.34:9131'
- Feb 17 03:56:25.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:56:25.000 [info] Bootstrapped 56%: Loading relay descriptors
- Feb 17 03:56:25.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3201/5979, and can only build 13% of likely paths. (We have 54% of guards bw, 53% of midpoint bw, and 46% of exit bw = 13% of path bw.)
- Feb 17 03:56:25.000 [info] update_consensus_router_descriptor_downloads(): 3 router descriptors downloadable. 1 delayed; 3208 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2785 in progress.
- Feb 17 03:56:25.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:25.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:25.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:25.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:25.000 [info] connection_dir_client_reached_eof(): Received server info (size 227240) from server '128.31.0.34:9131'
- Feb 17 03:56:26.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:56:27.000 [info] Bootstrapped 57%: Loading relay descriptors
- Feb 17 03:56:27.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3295/5979, and can only build 14% of likely paths. (We have 56% of guards bw, 54% of midpoint bw, and 48% of exit bw = 14% of path bw.)
- Feb 17 03:56:27.000 [info] update_consensus_router_descriptor_downloads(): 4 router descriptors downloadable. 1 delayed; 3303 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2689 in progress.
- Feb 17 03:56:27.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:27.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:27.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:27.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:27.000 [info] connection_dir_client_reached_eof(): Received server info (size 238099) from server '128.31.0.34:9131'
- Feb 17 03:56:28.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:28.000 [info] Bootstrapped 58%: Loading relay descriptors
- Feb 17 03:56:28.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3391/5979, and can only build 16% of likely paths. (We have 57% of guards bw, 56% of midpoint bw, and 50% of exit bw = 16% of path bw.)
- Feb 17 03:56:28.000 [info] update_consensus_router_descriptor_downloads(): 5 router descriptors downloadable. 1 delayed; 3399 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2592 in progress.
- Feb 17 03:56:28.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:28.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:28.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:28.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:28.000 [info] connection_dir_client_reached_eof(): Received server info (size 241625) from server '128.31.0.34:9131'
- Feb 17 03:56:30.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:30.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3487/5979, and can only build 18% of likely paths. (We have 59% of guards bw, 58% of midpoint bw, and 53% of exit bw = 18% of path bw.)
- Feb 17 03:56:30.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3495 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2496 in progress.
- Feb 17 03:56:30.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:30.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:30.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:30.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:30.000 [info] connection_dir_client_reached_eof(): Received server info (size 214045) from server '128.31.0.34:9131'
- Feb 17 03:56:31.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:32.000 [info] Bootstrapped 59%: Loading relay descriptors
- Feb 17 03:56:32.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3583/5979, and can only build 20% of likely paths. (We have 61% of guards bw, 59% of midpoint bw, and 56% of exit bw = 20% of path bw.)
- Feb 17 03:56:32.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3591 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2400 in progress.
- Feb 17 03:56:32.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:32.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:32.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:32.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:32.000 [info] connection_dir_client_reached_eof(): Received server info (size 218820) from server '128.31.0.34:9131'
- Feb 17 03:56:33.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:33.000 [notice] Bootstrapped 61%: Loading relay descriptors
- Feb 17 03:56:33.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3678/5979, and can only build 22% of likely paths. (We have 62% of guards bw, 60% of midpoint bw, and 59% of exit bw = 22% of path bw.)
- Feb 17 03:56:34.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3687 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2304 in progress.
- Feb 17 03:56:34.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:34.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:34.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:34.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:34.000 [info] connection_dir_client_reached_eof(): Received server info (size 221871) from server '128.31.0.34:9131'
- Feb 17 03:56:35.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:35.000 [info] Bootstrapped 62%: Loading relay descriptors
- Feb 17 03:56:35.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3774/5979, and can only build 24% of likely paths. (We have 64% of guards bw, 62% of midpoint bw, and 61% of exit bw = 24% of path bw.)
- Feb 17 03:56:35.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3783 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2208 in progress.
- Feb 17 03:56:35.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:35.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:35.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:35.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:35.000 [info] connection_dir_client_reached_eof(): Received server info (size 219844) from server '128.31.0.34:9131'
- Feb 17 03:56:36.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:37.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3870/5979, and can only build 25% of likely paths. (We have 65% of guards bw, 64% of midpoint bw, and 61% of exit bw = 25% of path bw.)
- Feb 17 03:56:37.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3879 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2112 in progress.
- Feb 17 03:56:37.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:37.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:37.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:37.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:37.000 [info] connection_dir_client_reached_eof(): Received server info (size 219193) from server '128.31.0.34:9131'
- Feb 17 03:56:38.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:38.000 [info] Bootstrapped 63%: Loading relay descriptors
- Feb 17 03:56:39.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 3966/5979, and can only build 28% of likely paths. (We have 68% of guards bw, 66% of midpoint bw, and 62% of exit bw = 28% of path bw.)
- Feb 17 03:56:39.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 3975 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 2016 in progress.
- Feb 17 03:56:39.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:39.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:39.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:39.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:39.000 [info] connection_dir_client_reached_eof(): Received server info (size 216940) from server '128.31.0.34:9131'
- Feb 17 03:56:40.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:40.000 [info] Bootstrapped 64%: Loading relay descriptors
- Feb 17 03:56:40.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4062/5979, and can only build 30% of likely paths. (We have 69% of guards bw, 68% of midpoint bw, and 64% of exit bw = 30% of path bw.)
- Feb 17 03:56:40.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4071 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1920 in progress.
- Feb 17 03:56:40.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:40.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:40.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:40.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:40.000 [info] connection_dir_client_reached_eof(): Received server info (size 229469) from server '128.31.0.34:9131'
- Feb 17 03:56:42.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:42.000 [info] Bootstrapped 65%: Loading relay descriptors
- Feb 17 03:56:42.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4157/5979, and can only build 32% of likely paths. (We have 71% of guards bw, 69% of midpoint bw, and 65% of exit bw = 32% of path bw.)
- Feb 17 03:56:42.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4167 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1824 in progress.
- Feb 17 03:56:42.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:42.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:42.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:42.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:42.000 [info] connection_dir_client_reached_eof(): Received server info (size 218968) from server '128.31.0.34:9131'
- Feb 17 03:56:43.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:44.000 [notice] Bootstrapped 66%: Loading relay descriptors
- Feb 17 03:56:44.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4252/5979, and can only build 34% of likely paths. (We have 72% of guards bw, 70% of midpoint bw, and 67% of exit bw = 34% of path bw.)
- Feb 17 03:56:44.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4263 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1728 in progress.
- Feb 17 03:56:44.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:44.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:44.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:44.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:44.000 [info] connection_dir_client_reached_eof(): Received server info (size 220465) from server '128.31.0.34:9131'
- Feb 17 03:56:45.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:45.000 [info] Bootstrapped 67%: Loading relay descriptors
- Feb 17 03:56:45.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4348/5979, and can only build 36% of likely paths. (We have 74% of guards bw, 72% of midpoint bw, and 68% of exit bw = 36% of path bw.)
- Feb 17 03:56:45.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4359 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1632 in progress.
- Feb 17 03:56:45.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:45.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:45.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:45.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:45.000 [info] connection_dir_client_reached_eof(): Received server info (size 218379) from server '128.31.0.34:9131'
- Feb 17 03:56:47.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:47.000 [info] Bootstrapped 68%: Loading relay descriptors
- Feb 17 03:56:47.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4442/5979, and can only build 39% of likely paths. (We have 75% of guards bw, 73% of midpoint bw, and 70% of exit bw = 39% of path bw.)
- Feb 17 03:56:47.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4455 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1536 in progress.
- Feb 17 03:56:47.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:47.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4455 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1536 in progress.
- Feb 17 03:56:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:47.000 [info] connection_dir_client_reached_eof(): Received server info (size 258814) from server '128.31.0.34:9131'
- Feb 17 03:56:50.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:50.000 [info] Bootstrapped 70%: Loading relay descriptors
- Feb 17 03:56:50.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4538/5979, and can only build 43% of likely paths. (We have 76% of guards bw, 74% of midpoint bw, and 75% of exit bw = 43% of path bw.)
- Feb 17 03:56:50.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4551 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1440 in progress.
- Feb 17 03:56:50.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:50.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:50.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:50.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:50.000 [info] connection_dir_client_reached_eof(): Received server info (size 227300) from server '128.31.0.34:9131'
- Feb 17 03:56:52.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:52.000 [notice] Bootstrapped 72%: Loading relay descriptors
- Feb 17 03:56:52.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4634/5979, and can only build 45% of likely paths. (We have 78% of guards bw, 76% of midpoint bw, and 76% of exit bw = 45% of path bw.)
- Feb 17 03:56:52.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4647 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1344 in progress.
- Feb 17 03:56:52.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:52.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:52.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:52.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:52.000 [info] connection_dir_client_reached_eof(): Received server info (size 230470) from server '128.31.0.34:9131'
- Feb 17 03:56:53.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:54.000 [info] Bootstrapped 73%: Loading relay descriptors
- Feb 17 03:56:54.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4730/5979, and can only build 48% of likely paths. (We have 79% of guards bw, 78% of midpoint bw, and 78% of exit bw = 48% of path bw.)
- Feb 17 03:56:54.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4743 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1248 in progress.
- Feb 17 03:56:54.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:54.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:54.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:54.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:54.000 [info] connection_dir_client_reached_eof(): Received server info (size 237877) from server '128.31.0.34:9131'
- Feb 17 03:56:55.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:55.000 [info] Bootstrapped 75%: Loading relay descriptors
- Feb 17 03:56:56.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4825/5979, and can only build 52% of likely paths. (We have 81% of guards bw, 80% of midpoint bw, and 79% of exit bw = 52% of path bw.)
- Feb 17 03:56:56.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4839 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1152 in progress.
- Feb 17 03:56:56.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:56.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:56.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:56.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:56.000 [info] connection_dir_client_reached_eof(): Received server info (size 229443) from server '128.31.0.34:9131'
- Feb 17 03:56:57.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:57.000 [info] Bootstrapped 76%: Loading relay descriptors
- Feb 17 03:56:57.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 4921/5979, and can only build 55% of likely paths. (We have 83% of guards bw, 81% of midpoint bw, and 81% of exit bw = 55% of path bw.)
- Feb 17 03:56:57.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 4935 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 1056 in progress.
- Feb 17 03:56:57.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:57.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:57.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:57.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:57.000 [info] connection_dir_client_reached_eof(): Received server info (size 236664) from server '128.31.0.34:9131'
- Feb 17 03:56:59.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:56:59.000 [notice] Bootstrapped 78%: Loading relay descriptors
- Feb 17 03:56:59.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more descriptors: we have 5016/5979, and can only build 58% of likely paths. (We have 84% of guards bw, 83% of midpoint bw, and 83% of exit bw = 58% of path bw.)
- Feb 17 03:56:59.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 5031 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 960 in progress.
- Feb 17 03:56:59.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:56:59.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:56:59.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:56:59.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:56:59.000 [info] connection_dir_client_reached_eof(): Received server info (size 223052) from server '128.31.0.34:9131'
- Feb 17 03:57:00.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:57:01.000 [notice] Bootstrapped 80%: Connecting to the Tor network
- Feb 17 03:57:01.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:01.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:01.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:01.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:01.000 [info] connection_dir_client_reached_eof(): Received server info (size 243565) from server '128.31.0.34:9131'
- Feb 17 03:57:02.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:02.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:02.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:02.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:02.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:02.000 [info] connection_dir_client_reached_eof(): Received server info (size 220271) from server '128.31.0.34:9131'
- Feb 17 03:57:04.000 [info] router_load_routers_from_string(): 95 elements to add
- Feb 17 03:57:04.000 [info] connection_dir_client_reached_eof(): Received 95/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:04.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:04.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:04.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:04.000 [info] connection_dir_client_reached_eof(): Received server info (size 226237) from server '128.31.0.34:9131'
- Feb 17 03:57:05.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:06.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:06.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:06.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:06.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:06.000 [info] connection_dir_client_reached_eof(): Received server info (size 216873) from server '128.31.0.34:9131'
- Feb 17 03:57:07.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:07.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:07.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:07.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:07.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:07.000 [info] connection_dir_client_reached_eof(): Received server info (size 223922) from server '128.31.0.34:9131'
- Feb 17 03:57:09.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:09.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:09.000 [info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
- Feb 17 03:57:09.000 [info] choose_good_exit_server_general(): Found 821 servers that might support 0/0 pending connections.
- Feb 17 03:57:09.000 [info] choose_good_exit_server_general(): Chose exit server '$4031460683AE9E0512D3620C2758D98758AC6C93~niftyeuropeanrabbit at 185.220.101.10'
- Feb 17 03:57:09.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:09.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5605 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 384 in progress.
- Feb 17 03:57:09.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
- Feb 17 03:57:09.000 [info] directory_send_command(): Downloading consensus from 62.210.90.164:9030 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
- Feb 17 03:57:09.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:09.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:09.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:09.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
- Feb 17 03:57:09.000 [info] routerlist_remove_old_routers(): We have 5605 live routers and 14259 old router descriptors.
- Feb 17 03:57:09.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:09.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:09.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:09.000 [info] connection_dir_client_reached_eof(): Received server info (size 236903) from server '204.13.164.118:80'
- Feb 17 03:57:11.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:11.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 204.13.164.118:80
- Feb 17 03:57:11.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:11.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:11.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:11.000 [info] connection_dir_client_reached_eof(): Received server info (size 248995) from server '128.31.0.34:9131'
- Feb 17 03:57:12.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:13.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:13.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:13.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:13.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:13.000 [info] connection_dir_client_reached_eof(): Received server info (size 252514) from server '128.31.0.34:9131'
- Feb 17 03:57:14.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:14.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:15.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:15.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:15.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:15.000 [info] connection_dir_client_reached_eof(): Received server info (size 231895) from server '128.31.0.34:9131'
- Feb 17 03:57:16.000 [info] router_load_routers_from_string(): 96 elements to add
- Feb 17 03:57:16.000 [info] connection_dir_client_reached_eof(): Received 96/96 router descriptors requested from 128.31.0.34:9131
- Feb 17 03:57:16.000 [info] channel_register(): Channel 0x32ce318 (global ID 6) in state opening (1) registered with no identity digest
- Feb 17 03:57:16.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
- Feb 17 03:57:16.000 [info] circuit_predict_and_launch_new(): Have 1 clean circs (0 internal), need another exit circ.
- Feb 17 03:57:16.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:16.000 [info] choose_good_exit_server_general(): Chose exit server '$ABC95691E48C71605244E2B6A4F0BE8E79848F1B~xorox at 37.187.94.86'
- Feb 17 03:57:16.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Connection in progress; waiting.
- Feb 17 03:57:16.000 [info] circuit_predict_and_launch_new(): Have 2 clean circs (0 uptime-internal, 0 internal), need another hidden service circ.
- Feb 17 03:57:16.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Connection in progress; waiting.
- Feb 17 03:57:16.000 [info] Received http status code 304 ("Not modified") from server '62.210.90.164:9030' while fetching consensus directory.
- Feb 17 03:57:16.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:35874; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:16.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:16.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:16.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:16.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
- Feb 17 03:57:16.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:16.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:16.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:16.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is F1D71314781D23800C3C62CB720BBCF449B27399. Our address is apparently 92.75.246.198.
- Feb 17 03:57:17.000 [info] circuit_predict_and_launch_new(): Have 3 clean circs (1 uptime-internal, 1 internal), need another hidden service circ.
- Feb 17 03:57:17.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:18.000 [info] circuit_predict_and_launch_new(): Have 4 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:18.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] exit circ (length 3, last hop niftyeuropeanrabbit): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $931BE618172446D534478988C01EE1CBD1874A97(closed) $4031460683AE9E0512D3620C2758D98758AC6C93(closed)
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] exit circ (length 3, last hop xorox): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $26E3923C96EA3F6549EB0B96157CF8B8EE21A7DC(closed) $ABC95691E48C71605244E2B6A4F0BE8E79848F1B(closed)
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] internal (high-uptime) circ (length 3, last hop poildortie): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $328E54981C6DDD7D89B89E418724A4A7881E3192(closed) $579B528179D182C78B503B7A0530492DEB7BAD86(closed)
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:21.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 278.645508/296.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] exit circ (length 3, last hop niftyeuropeanrabbit): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $931BE618172446D534478988C01EE1CBD1874A97(open) $4031460683AE9E0512D3620C2758D98758AC6C93(closed)
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:21.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 278.645508/297.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] internal (high-uptime) circ (length 3, last hop poildortie): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $328E54981C6DDD7D89B89E418724A4A7881E3192(open) $579B528179D182C78B503B7A0530492DEB7BAD86(closed)
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:21.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 278.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] exit circ (length 3, last hop xorox): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $26E3923C96EA3F6549EB0B96157CF8B8EE21A7DC(open) $ABC95691E48C71605244E2B6A4F0BE8E79848F1B(closed)
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] internal (high-uptime) circ (length 3, last hop poildortie): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $328E54981C6DDD7D89B89E418724A4A7881E3192(open) $579B528179D182C78B503B7A0530492DEB7BAD86(open)
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:21.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6825.836054ms, 60000.000000ms, Xm: 4737, a: 4.405667, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:21.000 [info] pathbias_count_build_success(): Got success count 279.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:21.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
- Feb 17 03:57:21.000 [notice] Bootstrapped 100%: Done
- Feb 17 03:57:21.000 [notice] Now checking whether ORPort 92.75.246.198:9001 and DirPort 92.75.246.198:9030 are reachable... (this may take up to 20 minutes -- look for log messages indicating success)
- Feb 17 03:57:21.000 [info] consider_testing_reachability(): Testing reachability of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:21.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:21.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:21.000 [info] connection_ap_make_link(): Making internal anonymized tunnel to [scrubbed]:9030 ...
- Feb 17 03:57:21.000 [info] connection_ap_make_link(): ... application connection created and linked.
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] exit circ (length 3, last hop niftyeuropeanrabbit): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $931BE618172446D534478988C01EE1CBD1874A97(open) $4031460683AE9E0512D3620C2758D98758AC6C93(open)
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:21.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6825.836054ms, 60000.000000ms, Xm: 4737, a: 4.405667, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:21.000 [info] pathbias_count_build_success(): Got success count 280.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Found 215 servers that might support 1/1 pending connections.
- Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Chose exit server '$C793AB88565DDD3C9E4C6F15CCB9D8C7EF964CE9~ori at 85.248.227.163'
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
- Feb 17 03:57:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
- Feb 17 03:57:21.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:21.000 [info] exit circ (length 3, last hop xorox): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $26E3923C96EA3F6549EB0B96157CF8B8EE21A7DC(open) $ABC95691E48C71605244E2B6A4F0BE8E79848F1B(open)
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 33
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:21.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:21.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6825.920068ms, 60000.000000ms, Xm: 4737, a: 4.405519, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:21.000 [info] pathbias_count_build_success(): Got success count 281.645508/298.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:21.000 [info] circuit_predict_and_launch_new(): Have 6 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Found 215 servers that might support 1/1 pending connections.
- Feb 17 03:57:21.000 [info] choose_good_exit_server_general(): Chose exit server '$8CA16E878293D11F0E0803E5FC09F93A5C666889~Auroch at 178.17.174.198'
- Feb 17 03:57:21.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:22.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:22.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:22.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:22.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$2F9AFDE43DC8E3F05803304C01BD3DBF329169AC~dutreuil at 213.152.168.27'
- Feb 17 03:57:22.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 2F9AFDE43DC8E3F05803304C01BD3DBF329169AC. Our address is apparently 92.75.246.198.
- Feb 17 03:57:22.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:22.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F9AFDE43DC8E3F05803304C01BD3DBF329169AC(open) $D77F7FBE10944A62A07591250D5935786A84E276(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:22.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:22.000 [info] circuit_predict_and_launch_new(): Have 6 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:22.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:23.000 [info] circuit_predict_and_launch_new(): Have 6 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:23.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:26.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:26.000 [info] exit circ (length 3, last hop Auroch): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(closed) $8CA16E878293D11F0E0803E5FC09F93A5C666889(closed)
- Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:26.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 281.645508/299.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:26.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:26.000 [info] exit circ (length 3, last hop Auroch): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(closed)
- Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:26.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:26.000 [info] exit circ (length 3, last hop Auroch): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(open)
- Feb 17 03:57:26.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:26.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:26.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:26.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6822.198680ms, 60000.000000ms, Xm: 4737, a: 4.412105, r: 0.142000) based on 1000 circuit times
- Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:26.000 [info] pathbias_count_build_success(): Got success count 282.645508/299.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:26.000 [info] exit circ (length 3): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(open)
- Feb 17 03:57:26.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
- Feb 17 03:57:26.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 0 on circ 3542240276 to begin stream 32012.
- Feb 17 03:57:26.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3542240276
- Feb 17 03:57:26.000 [info] connection_ap_handshake_send_begin(): Sending up to 66 + 0 bytes of queued-up data
- Feb 17 03:57:26.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:26.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:26.000 [info] choose_good_exit_server_general(): Chose exit server '$317FA39B1255C8AFA0AFA45D2113E1C750B32925~ConradsOVHRelay02 at 144.217.164.185'
- Feb 17 03:57:26.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:26.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3542240276 streamid 32012 after 0 seconds.
- Feb 17 03:57:26.000 [info] exit circ (length 3): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $8B1CC76D6D1370A67263628D4CBC01B62903D0BF(open) $8CA16E878293D11F0E0803E5FC09F93A5C666889(open)
- Feb 17 03:57:27.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 32012. Removing stream.
- Feb 17 03:57:27.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
- Feb 17 03:57:27.000 [info] connection_dir_client_reached_eof(): Received server info (size 2290) from server '92.75.246.198:9030'
- Feb 17 03:57:27.000 [notice] Self-testing indicates your DirPort is reachable from the outside. Excellent.
- Feb 17 03:57:27.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: DirPort found reachable
- Feb 17 03:57:27.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
- Feb 17 03:57:27.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:27.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:27.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:27.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:27.000 [info] router_rebuild_descriptor(): Rebuilding relay descriptor
- Feb 17 03:57:27.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:27.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:27.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:27.000 [info] extrainfo_dump_to_string(): Adding stats to extra-info descriptor.
- Feb 17 03:57:27.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:28.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:28.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:31.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:31.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:31.000 [info] choose_good_exit_server_general(): Chose exit server '$7BFB908A3AA5B491DA4CA72CCBEE0E1F2A939B55~sofia at 77.247.181.162'
- Feb 17 03:57:31.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:32.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:32.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:33.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:33.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:36.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:36.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:36.000 [info] choose_good_exit_server_general(): Chose exit server '$0593F5255316748247EBA76353A3A61F62224903~novatorrelay at 93.174.93.71'
- Feb 17 03:57:36.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:37.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:37.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:38.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:38.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:41.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:41.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:41.000 [info] choose_good_exit_server_general(): Chose exit server '$E41B16F7DDF52EBB1DB4268AB2FE340B37AD8904~xmission1 at 166.70.207.2'
- Feb 17 03:57:41.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:42.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:42.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:43.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:43.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:46.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:46.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:46.000 [info] choose_good_exit_server_general(): Chose exit server '$0593F5255316748247EBA76353A3A61F62224903~novatorrelay at 93.174.93.71'
- Feb 17 03:57:46.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:47.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
- Feb 17 03:57:47.000 [info] directory_send_command(): Downloading consensus from 47.21.17.37:9030 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
- Feb 17 03:57:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
- Feb 17 03:57:47.000 [info] routerlist_remove_old_routers(): We have 5989 live routers and 14258 old router descriptors.
- Feb 17 03:57:47.000 [info] consider_testing_reachability(): Testing reachability of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:47.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:48.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:48.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5989 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
- Feb 17 03:57:48.000 [info] circuit_predict_and_launch_new(): Have 4 clean circs (1 uptime-internal, 1 internal), need another hidden service circ.
- Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:48.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$227A940AC3AF002F17982D97E467AC481D391C58~Preece01 at 79.137.70.137'
- Feb 17 03:57:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 227A940AC3AF002F17982D97E467AC481D391C58. Our address is apparently 92.75.246.198.
- Feb 17 03:57:48.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:48.000 [info] internal circ (length 3, last hop RoteServerPaul): $227A940AC3AF002F17982D97E467AC481D391C58(open) $258D74360EB18DBB1E08648366B21B8AE00F9CD2(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:48.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:48.000 [info] internal circ (length 3, last hop RoteServerPaul): $227A940AC3AF002F17982D97E467AC481D391C58(open) $258D74360EB18DBB1E08648366B21B8AE00F9CD2(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:48.000 [info] channel_register(): Channel 0x4fda240 (global ID 9) in state opening (1) registered with no identity digest
- Feb 17 03:57:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:12176; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:12176: Waiting for AUTHENTICATE.
- Feb 17 03:57:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9001: Looks good.
- Feb 17 03:57:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9001; OR connection is now open, using protocol version 4. Its ID digest is 258D74360EB18DBB1E08648366B21B8AE00F9CD2. Our address is apparently 92.75.246.198.
- Feb 17 03:57:48.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
- Feb 17 03:57:48.000 [info] mark_my_descriptor_dirty(): Decided to publish new relay descriptor: ORPort found reachable
- Feb 17 03:57:48.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:48.000 [info] internal circ (length 3, last hop RoteServerPaul): $227A940AC3AF002F17982D97E467AC481D391C58(open) $258D74360EB18DBB1E08648366B21B8AE00F9CD2(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
- Feb 17 03:57:48.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:48.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:48.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:48.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6822.198680ms, 60000.000000ms, Xm: 4737, a: 4.412105, r: 0.142000) based on 1000 circuit times
- Feb 17 03:57:48.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:48.000 [info] router_rebuild_descriptor(): Rebuilding relay descriptor
- Feb 17 03:57:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:57:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:57:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
- Feb 17 03:57:48.000 [info] extrainfo_dump_to_string(): Adding stats to extra-info descriptor.
- Feb 17 03:57:48.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:48.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:48.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:48.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:48.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:49.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:49.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (2 uptime-internal, 2 internal), need another hidden service circ.
- Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:49.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:9001; Sending cells: CERTS
- Feb 17 03:57:49.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:9001: Authenticated it.
- Feb 17 03:57:49.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:9001: Sending authentication
- Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$360CBA08D1E24F513162047BDB54A1015E531534~Aerodynamik06 at 54.37.17.235'
- Feb 17 03:57:49.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9001; OR connection is now open, using protocol version 4. Its ID digest is 360CBA08D1E24F513162047BDB54A1015E531534. Our address is apparently 92.75.246.198.
- Feb 17 03:57:49.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:49.000 [info] internal circ (length 3, last hop RoteServerPaul): $360CBA08D1E24F513162047BDB54A1015E531534(open) $0FC19616FD1AA6266703BA2893CF7EDF6525F860(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:49.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:49.000 [info] internal circ (length 3, last hop RoteServerPaul): $360CBA08D1E24F513162047BDB54A1015E531534(open) $0FC19616FD1AA6266703BA2893CF7EDF6525F860(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:49.000 [info] channel_register(): Channel 0x35f39a8 (global ID 12) in state opening (1) registered with no identity digest
- Feb 17 03:57:49.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:56690; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:49.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:56690: Waiting for AUTHENTICATE.
- Feb 17 03:57:49.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9001: Looks good.
- Feb 17 03:57:49.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9001; OR connection is now open, using protocol version 4. Its ID digest is 0FC19616FD1AA6266703BA2893CF7EDF6525F860. Our address is apparently 92.75.246.198.
- Feb 17 03:57:49.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:49.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:49.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:49.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:49.000 [info] internal circ (length 3, last hop RoteServerPaul): $360CBA08D1E24F513162047BDB54A1015E531534(open) $0FC19616FD1AA6266703BA2893CF7EDF6525F860(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
- Feb 17 03:57:49.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:49.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:49.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:49.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6822.198680ms, 60000.000000ms, Xm: 4737, a: 4.412105, r: 0.142000) based on 1000 circuit times
- Feb 17 03:57:49.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:49.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:49.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:50.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:50.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257~TOR2DFN01b at 217.182.198.95'
- Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257. Our address is apparently 92.75.246.198.
- Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257(open) $BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257(open) $BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:50.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$CEECFBB82FC484051E89719C49DC803F65AABC72~vautier at 5.135.65.145'
- Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is CEECFBB82FC484051E89719C49DC803F65AABC72. Our address is apparently 92.75.246.198.
- Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $CEECFBB82FC484051E89719C49DC803F65AABC72(open) $BE6CF26814BD1F35B76FE576702DBA9627EE8237(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:50.000 [info] channel_register(): Channel 0x2fe7850 (global ID 15) in state opening (1) registered with no identity digest
- Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $CEECFBB82FC484051E89719C49DC803F65AABC72(open) $BE6CF26814BD1F35B76FE576702DBA9627EE8237(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:50.000 [info] channel_register(): Channel 0x32310f0 (global ID 16) in state opening (1) registered with no identity digest
- Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:52975; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:50.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:51923; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:52975: Waiting for AUTHENTICATE.
- Feb 17 03:57:50.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:6881: Looks good.
- Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:6881; OR connection is now open, using protocol version 4. Its ID digest is BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1. Our address is apparently 92.75.246.198.
- Feb 17 03:57:50.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:51923: Waiting for AUTHENTICATE.
- Feb 17 03:57:50.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:57:50.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is BE6CF26814BD1F35B76FE576702DBA9627EE8237. Our address is apparently 92.75.246.198.
- Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F09BD6D9A2D5A7D6D26C17651CE8ECF0B7BA257(open) $BF50E09EED25B82861CF95E1AAA42DCFEF53E5D1(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
- Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:50.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6821.217931ms, 60000.000000ms, Xm: 4737, a: 4.413845, r: 0.142000) based on 1000 circuit times
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:50.000 [info] consider_testing_reachability(): Testing bandwidth of my ORPort: 92.75.246.198:9001.
- Feb 17 03:57:50.000 [info] onion_pick_cpath_exit(): Using requested exit node '$C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5~RoteServerPaul at 92.75.246.198'
- Feb 17 03:57:50.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
- Feb 17 03:57:50.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:50.000 [info] internal circ (length 3, last hop RoteServerPaul): $CEECFBB82FC484051E89719C49DC803F65AABC72(open) $BE6CF26814BD1F35B76FE576702DBA9627EE8237(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
- Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:50.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:50.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6813.534630ms, 60000.000000ms, Xm: 4737, a: 4.427529, r: 0.141000) based on 1000 circuit times
- Feb 17 03:57:50.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:50.000 [notice] Performing bandwidth self-test...done.
- Feb 17 03:57:51.000 [info] circuit_predict_and_launch_new(): Have 5 clean circs (3 internal), need another exit circ.
- Feb 17 03:57:51.000 [info] choose_good_exit_server_general(): Found 873 servers that might support 0/0 pending connections.
- Feb 17 03:57:51.000 [info] choose_good_exit_server_general(): Chose exit server '$204DFD2A2C6A0DC1FA0EACB495218E0B661704FD~HaveHeart at 77.247.181.164'
- Feb 17 03:57:51.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$F1D71314781D23800C3C62CB720BBCF449B27399~Unnamed at 195.154.237.147'
- Feb 17 03:57:52.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:52.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:52.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:52.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1~wien at 94.23.247.42'
- Feb 17 03:57:52.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1. Our address is apparently 92.75.246.198.
- Feb 17 03:57:52.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:52.000 [info] internal (high-uptime) circ (length 3, last hop Unnamed): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $1D2E445EAB4936BB397C965A5576F8548AB496AC(closed) $FF3059E77E5D22F1C3B20CCBE125691AD27588DD(closed)
- Feb 17 03:57:52.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal circ (length 3, last hop RoteServerPaul): $06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1(open) $2A5746BFF32A363CD3AAD05196C0F10E7143BBB6(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:53.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 282.645508/300.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Unnamed): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $1D2E445EAB4936BB397C965A5576F8548AB496AC(open) $FF3059E77E5D22F1C3B20CCBE125691AD27588DD(closed)
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:53.000 [info] Received http status code 304 ("Not modified") from server '47.21.17.37:9030' while fetching consensus directory.
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Freebird32): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $A22EB053B055631C8022634CFDAF5AFDACA1ADE8(closed) $0C475BA4D3AA3C289B716F95954CAD616E50C4E5(closed)
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal circ (length 3, last hop RoteServerPaul): $06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1(open) $2A5746BFF32A363CD3AAD05196C0F10E7143BBB6(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Unnamed): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $1D2E445EAB4936BB397C965A5576F8548AB496AC(open) $FF3059E77E5D22F1C3B20CCBE125691AD27588DD(open)
- Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:53.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6776.204984ms, 60000.000000ms, Xm: 4737, a: 4.495471, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:53.000 [info] pathbias_count_build_success(): Got success count 283.645508/300.100098 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:53.000 [info] pathbias_scale_close_rates(): Scaled pathbias counts to (144.322754,134.447510)/153.050049 (5/1 open) for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:53.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 144.322754/154.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Freebird32): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $A22EB053B055631C8022634CFDAF5AFDACA1ADE8(open) $0C475BA4D3AA3C289B716F95954CAD616E50C4E5(closed)
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:53.000 [info] channel_register(): Channel 0x238e028 (global ID 18) in state opening (1) registered with no identity digest
- Feb 17 03:57:53.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:443; Sending cells: CERTS
- Feb 17 03:57:53.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:443: Authenticated it.
- Feb 17 03:57:53.000 [info] channel_tls_process_auth_challenge_cell(): Got an AUTH_CHALLENGE cell from [scrubbed]:443: Sending authentication
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to '$456C1E39B5780CD05267F8EFEF123A2FA8DB7715~fithnovember at 79.137.116.43'
- Feb 17 03:57:53.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 456C1E39B5780CD05267F8EFEF123A2FA8DB7715. Our address is apparently 92.75.246.198.
- Feb 17 03:57:53.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:53.000 [info] internal (high-uptime) circ (length 3, last hop Freebird32): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $A22EB053B055631C8022634CFDAF5AFDACA1ADE8(open) $0C475BA4D3AA3C289B716F95954CAD616E50C4E5(open)
- Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
- Feb 17 03:57:53.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4625 23
- Feb 17 03:57:53.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6772.457165ms, 60000.000000ms, Xm: 4730, a: 4.483879, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:53.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:53.000 [info] pathbias_count_build_success(): Got success count 145.322754/154.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:54.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:54.000 [info] internal circ (length 3, last hop RoteServerPaul): $456C1E39B5780CD05267F8EFEF123A2FA8DB7715(open) $18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB(closed) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:54.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:54.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:54584; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:54.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:54584: Waiting for AUTHENTICATE.
- Feb 17 03:57:54.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:57:54.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 2A5746BFF32A363CD3AAD05196C0F10E7143BBB6. Our address is apparently 92.75.246.198.
- Feb 17 03:57:54.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:54.000 [info] internal circ (length 3, last hop RoteServerPaul): $456C1E39B5780CD05267F8EFEF123A2FA8DB7715(open) $18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:57:54.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:54.000 [info] channel_register(): Channel 0x3856108 (global ID 19) in state opening (1) registered with no identity digest
- Feb 17 03:57:54.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:54.000 [info] internal circ (length 3, last hop RoteServerPaul): $06E72526BBE040C51C5ADFBAA07ADD9AEB5E1FA1(open) $2A5746BFF32A363CD3AAD05196C0F10E7143BBB6(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
- Feb 17 03:57:54.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:54.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
- Feb 17 03:57:54.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4625 22
- Feb 17 03:57:54.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6773.528325ms, 60000.000000ms, Xm: 4732, a: 4.487186, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:54.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:54.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:59944; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:57:54.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:59944: Waiting for AUTHENTICATE.
- Feb 17 03:57:54.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:36746: Looks good.
- Feb 17 03:57:54.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:36746; OR connection is now open, using protocol version 4. Its ID digest is 18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB. Our address is apparently 92.75.246.198.
- Feb 17 03:57:55.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:55.000 [info] internal circ (length 3, last hop RoteServerPaul): $456C1E39B5780CD05267F8EFEF123A2FA8DB7715(open) $18263FC21DA7FB47AE76C0ED27CA69CFCED6FDFB(open) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(open)
- Feb 17 03:57:55.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:55.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4825 28
- Feb 17 03:57:55.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4625 22
- Feb 17 03:57:55.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6773.528325ms, 60000.000000ms, Xm: 4732, a: 4.487186, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:55.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:56.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:56.000 [info] exit circ (length 3, last hop HaveHeart): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(closed) $204DFD2A2C6A0DC1FA0EACB495218E0B661704FD(closed)
- Feb 17 03:57:56.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:56.000 [info] entry_guard_inc_circ_attempt_count(): Got success count 145.322754/155.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:57:56.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:56.000 [info] exit circ (length 3, last hop HaveHeart): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(open) $204DFD2A2C6A0DC1FA0EACB495218E0B661704FD(closed)
- Feb 17 03:57:56.000 [info] circuit_send_next_onion_skin(): Sending extend relay cell.
- Feb 17 03:57:56.000 [info] circuit_finish_handshake(): Finished building circuit hop:
- Feb 17 03:57:56.000 [info] exit circ (length 3, last hop HaveHeart): $F1D71314781D23800C3C62CB720BBCF449B27399(open) $18B160CD5E22BFC345AEE7BA84B7EA45BF457FCA(open) $204DFD2A2C6A0DC1FA0EACB495218E0B661704FD(open)
- Feb 17 03:57:56.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:57:56.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 33
- Feb 17 03:57:56.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:57:56.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6776.204984ms, 60000.000000ms, Xm: 4737, a: 4.495471, r: 0.140000) based on 1000 circuit times
- Feb 17 03:57:56.000 [info] circuit_send_next_onion_skin(): circuit built!
- Feb 17 03:57:56.000 [info] pathbias_count_build_success(): Got success count 146.322754/155.050049 for guard Unnamed ($F1D71314781D23800C3C62CB720BBCF449B27399)
- Feb 17 03:58:02.000 [info] channel_register(): Channel 0x2fa9d88 (global ID 20) in state opening (1) registered with no identity digest
- Feb 17 03:58:02.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:39827; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:22.000 [info] circuit_build_times_get_xm(): Xm mode #0: 4725 34
- Feb 17 03:58:22.000 [info] circuit_build_times_get_xm(): Xm mode #1: 4675 32
- Feb 17 03:58:22.000 [info] circuit_build_times_get_xm(): Xm mode #2: 4825 28
- Feb 17 03:58:22.000 [info] circuit_build_times_set_timeout(): Set circuit build timeout to 7s (6826.997642ms, 60000.000000ms, Xm: 4737, a: 4.403616, r: 0.139000) based on 1000 circuit times
- Feb 17 03:58:22.000 [info] circuit_expire_building(): Abandoning circ 6 213.152.168.27:443:2730721988 (state 0,0:doing handshakes, purpose 13, len 3)
- Feb 17 03:58:22.000 [info] internal circ (length 3, last hop RoteServerPaul): $2F9AFDE43DC8E3F05803304C01BD3DBF329169AC(open) $D77F7FBE10944A62A07591250D5935786A84E276(waiting for keys) $C4989C1A5D3A91810E2A9E1801353A0CD4F4C4B5(closed)
- Feb 17 03:58:22.000 [info] pathbias_should_count(): Bug: Circuit 6 is now being counted despite being ignored in the past. Purpose is Measuring circuit timeout, path state is new (on Tor 0.2.9.14 )
- Feb 17 03:58:44.000 [info] channel_register(): Channel 0x3f5c2f8 (global ID 21) in state opening (1) registered with no identity digest
- Feb 17 03:58:45.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:47688; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:47.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5989 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
- Feb 17 03:58:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:58:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:58:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:58:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
- Feb 17 03:58:47.000 [info] router_upload_dir_desc_to_dirservers(): Uploading relay descriptor to directory authorities
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] directory_post_to_dirservers(): Uploading an extrainfo too (length 1147)
- Feb 17 03:58:47.000 [info] routerlist_remove_old_routers(): We have 5989 live routers and 14257 old router descriptors.
- Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:47.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:47.000 [info] channel_register(): Channel 0x4aa5a60 (global ID 22) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x5981bf0 (global ID 23) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x56bb4a8 (global ID 24) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x31fd350 (global ID 25) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x4a8db90 (global ID 26) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:36539; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x4675600 (global ID 27) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:33599; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x2d96b28 (global ID 28) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:46800; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x2daf9c0 (global ID 29) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:36539: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 7EA6EAD6FD83083C538F44038BBFA077587DD755. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:51181; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] connection_dir_client_reached_eof(): eof (status 200) after uploading server descriptor: finished.
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:33599: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 847B1F850344D7876491A54892F904934E4EB85D. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:33911; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:46800: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is F2044413DAC2E02E3D6BCF4735A19BCA1DE97281. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:51181: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 7BE683E65D48141321C5ED92F075C55364AC7123. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_register(): Channel 0x49453f8 (global ID 30) in state opening (1) registered with no identity digest
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:33911: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:80: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:80; OR connection is now open, using protocol version 4. Its ID digest is BD6A829255CB08E66FBE7D3748363586E46B3810. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:40732; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:40185; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:40732: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9101: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9101; OR connection is now open, using protocol version 4. Its ID digest is 9695DFC35FFEB861329B9F1AB04C46397020CE31. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:37045; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:40185: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 74A910646BCEEFBCD2E874FC1DC997430F968145. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:37045: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is CF6D0AAFB385BE71B8E111FC5CFF4B47923733BC. Our address is apparently 92.75.246.198.
- Feb 17 03:58:48.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:41893; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:58:48.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:41893: Waiting for AUTHENTICATE.
- Feb 17 03:58:48.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:58:48.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 24E2F139121D4394C54B5BCC368B3B411857C413. Our address is apparently 92.75.246.198.
- Feb 17 03:58:59.000 [info] channel_register(): Channel 0x3bcabd8 (global ID 31) in state opening (1) registered with no identity digest
- Feb 17 03:58:59.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:44394; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:59:19.000 [info] channel_register(): Channel 0x52f14f0 (global ID 32) in state opening (1) registered with no identity digest
- Feb 17 03:59:19.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:51469; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:59:19.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:51469: Waiting for AUTHENTICATE.
- Feb 17 03:59:19.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 03:59:19.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 7BE683E65D48141321C5ED92F075C55364AC7123. Our address is apparently 92.75.246.198.
- Feb 17 03:59:19.000 [info] connection_or_group_set_badness(): Marking OR conn to 193.23.244.244:443 as unsuitable for new circuits: (fd 33, 31 secs old). We have a better canonical one (fd 38; 0 secs old).
- Feb 17 03:59:19.000 [info] run_connection_housekeeping(): Expiring non-used OR connection to fd 33 (193.23.244.244:443) [Too old].
- Feb 17 03:59:20.000 [info] channel_register(): Channel 0x31fd350 (global ID 33) in state opening (1) registered with no identity digest
- Feb 17 03:59:20.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:39824; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 03:59:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:59:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:59:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:59:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
- Feb 17 03:59:47.000 [info] routerlist_remove_old_routers(): We have 5989 live routers and 14255 old router descriptors.
- Feb 17 03:59:47.000 [info] update_consensus_router_descriptor_downloads(): 8 router descriptors downloadable. 0 delayed; 5989 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
- Feb 17 03:59:47.000 [info] launch_descriptor_downloads(): Launching 2 requests for 8 routerdescs, 4 at a time
- Feb 17 03:59:47.000 [info] update_consensus_networkstatus_downloads(): Launching microdesc standard networkstatus consensus download.
- Feb 17 03:59:47.000 [info] directory_send_command(): Downloading consensus from 86.59.21.38 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
- Feb 17 03:59:47.000 [info] Received http status code 304 ("Not modified") from server '86.59.21.38:80' while fetching consensus directory.
- Feb 17 03:59:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 03:59:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 03:59:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 4487) from server '171.25.193.9:443'
- Feb 17 03:59:48.000 [info] router_load_routers_from_string(): 2 elements to add
- Feb 17 03:59:48.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
- Feb 17 03:59:48.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 5990 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 7 in progress.
- Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received 2/4 router descriptors requested from 171.25.193.9:443
- Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 0) from server '199.58.81.140:80'
- Feb 17 03:59:48.000 [info] connection_dir_client_reached_eof(): Received http status code 404 ("Servers unavailable") from server '199.58.81.140:80' while fetching "/tor/server/d/A52C8354ACB2082B69004559B8813B3FBE4415A6+AA82E353F9FBF9FA8F88DFC09DE17358F68F09D5+CE1211E693770B50A2BF98969BC23B2B44E18E01+EF8D472A33927651F42419773ED7F04065F79E80.z". I'll try again soon.
- Feb 17 04:00:47.000 [info] update_consensus_router_descriptor_downloads(): 7 router descriptors downloadable. 0 delayed; 5990 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
- Feb 17 04:00:47.000 [info] launch_descriptor_downloads(): Launching 2 requests for 7 routerdescs, 4 at a time
- Feb 17 04:00:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 04:00:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 04:00:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 04:00:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
- Feb 17 04:00:47.000 [info] routerlist_remove_old_routers(): We have 5990 live routers and 14252 old router descriptors.
- Feb 17 04:00:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 04:00:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 04:00:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 04:00:47.000 [info] connection_dir_client_reached_eof(): Received server info (size 2260) from server '131.188.40.189:80'
- Feb 17 04:00:47.000 [info] router_load_routers_from_string(): 1 elements to add
- Feb 17 04:00:48.000 [info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 5991 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 6 in progress.
- Feb 17 04:00:48.000 [info] connection_dir_client_reached_eof(): Received 1/3 router descriptors requested from 131.188.40.189:80
- Feb 17 04:00:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 04:00:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 04:00:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 04:00:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 2247) from server '199.58.81.140:80'
- Feb 17 04:00:48.000 [info] router_load_routers_from_string(): 1 elements to add
- Feb 17 04:00:48.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
- Feb 17 04:00:49.000 [info] connection_dir_client_reached_eof(): Received 1/4 router descriptors requested from 199.58.81.140:80
- Feb 17 04:00:49.000 [info] channel_register(): Channel 0x32dc2b0 (global ID 34) in state opening (1) registered with no identity digest
- Feb 17 04:00:49.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:48472; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 04:00:59.000 [info] channel_register(): Channel 0x32dc2b0 (global ID 35) in state opening (1) registered with no identity digest
- Feb 17 04:01:00.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:50632; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 04:01:00.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:50632: Waiting for AUTHENTICATE.
- Feb 17 04:01:00.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:443: Looks good.
- Feb 17 04:01:00.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:443; OR connection is now open, using protocol version 4. Its ID digest is 74A910646BCEEFBCD2E874FC1DC997430F968145. Our address is apparently 92.75.246.198.
- Feb 17 04:01:18.000 [info] channel_register(): Channel 0x32dc2b0 (global ID 36) in state opening (1) registered with no identity digest
- Feb 17 04:01:18.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:33933; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 04:01:18.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:33933: Waiting for AUTHENTICATE.
- Feb 17 04:01:18.000 [info] channel_tls_process_authenticate_cell(): Got an AUTHENTICATE cell from [scrubbed]:9101: Looks good.
- Feb 17 04:01:18.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:9101; OR connection is now open, using protocol version 4. Its ID digest is 9695DFC35FFEB861329B9F1AB04C46397020CE31. Our address is apparently 92.75.246.198.
- Feb 17 04:01:18.000 [info] connection_or_group_set_badness(): Marking OR conn to 128.31.0.34:9101 as unsuitable for new circuits: (fd 34, 150 secs old). We have a better canonical one (fd 33; 0 secs old).
- Feb 17 04:01:18.000 [info] run_connection_housekeeping(): Expiring non-used OR connection to fd 34 (128.31.0.34:9101) [Too old].
- Feb 17 04:01:21.000 [info] channel_register(): Channel 0x4675600 (global ID 37) in state opening (1) registered with no identity digest
- Feb 17 04:01:21.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:26853; Sending cells: VERSIONS CERTS AUTH_CHALLENGE NETINFO
- Feb 17 04:01:47.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 04:01:47.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 04:01:47.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 04:01:47.000 [info] check_descriptor_ipaddress_changed(): options->Address didn't resolve into an IP.
- Feb 17 04:01:47.000 [info] routerlist_remove_old_routers(): We have 5991 live routers and 14252 old router descriptors.
- Feb 17 04:01:47.000 [info] update_consensus_router_descriptor_downloads(): 6 router descriptors downloadable. 0 delayed; 5991 present (0 of those were in old_routers); 0 would_reject; 0 wouldnt_use; 0 in progress.
- Feb 17 04:01:47.000 [info] launch_descriptor_downloads(): Launching 2 requests for 6 routerdescs, 4 at a time
- Feb 17 04:01:47.000 [info] connection_dir_client_reached_eof(): Received server info (size 0) from server '171.25.193.9:443'
- Feb 17 04:01:47.000 [info] connection_dir_client_reached_eof(): Received http status code 404 ("Servers unavailable") from server '171.25.193.9:443' while fetching "/tor/server/d/AA82E353F9FBF9FA8F88DFC09DE17358F68F09D5+CE1211E693770B50A2BF98969BC23B2B44E18E01.z". I'll try again soon.
- Feb 17 04:01:48.000 [info] resolve_my_address(): Guessed local hostname 'roterPI-rSP' resolves to a private IP address (127.0.1.1). Trying something else.
- Feb 17 04:01:48.000 [info] resolve_my_address(): Interface IP address '192.168.2.104' is a private address too. Ignoring.
- Feb 17 04:01:48.000 [info] resolve_my_address(): Address 'roterPI-rSP' resolves to private IP address '127.0.1.1'. Tor servers that use the default DirAuthorities must have public IP addresses.
- Feb 17 04:01:48.000 [info] connection_dir_client_reached_eof(): Received server info (size 2247) from server '199.58.81.140:80'
- Feb 17 04:01:48.000 [info] router_load_routers_from_string(): 1 elements to add
- Feb 17 04:01:48.000 [info] router_load_routers_from_string(): Marking router 21818503B466B676960FB5349D45135FF83568E5 as never downloadable
- Feb 17 04:01:48.000 [info] connection_dir_client_reached_eof(): Received 1/4 router descriptors requested from 199.58.81.140:80
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement