-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello,
Please note that I erased my ~/.tor directory before running Tor client, to generate this error: Tor Client Config: ==================== AutomapHostsOnResolve 1 SafeLogging 0 #DNSListenAddress 127.0.0.1 #DNSPort 53 ExcludeNodes {US} # Log debug file /var/log/tor/debug.log TransListenAddress 127.0.0.1 TransPort 9040 UseBridges 1 TunnelDirConns 1 Bridge 50.7.249.43:993 Tor Client Log: =============== Feb 08 08:58:34.953 [Notice] Tor v0.2.2.22-alpha (git-21b3de6cf37d4e60). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Feb 08 08:58:34.954 [Notice] Initialized libevent version 1.4.13-stable using method epoll. Good. Feb 08 08:58:34.955 [Notice] Opening Socks listener on 127.0.0.1:9050 Feb 08 08:58:34.955 [Notice] Opening Transparent pf/netfilter listener on 127.0.0.1:9040 Feb 08 08:58:34.955 [Notice] Opening Control listener on 127.0.0.1:9051 Feb 08 08:58:34.956 [Warning] Fixing permissions on directory /home/architect/.tor Feb 08 08:58:34.956 [Notice] Parsing GEOIP file /usr/share/tor/geoip. Feb 08 08:58:37.873 [Debug] conn_read_callback(): socket 10 wants to read. Feb 08 08:58:37.874 [Debug] conn_read_callback(): socket 10 wants to read. Feb 08 08:58:37.874 [Debug] conn_read_callback(): socket 10 wants to read. Feb 08 08:58:38.094 [Debug] conn_write_callback(): socket 11 wants to write. Feb 08 08:58:38.095 [Debug] connection_or_finished_connecting(): OR connect() to router at 50.7.249.43:993 finished. Feb 08 08:58:38.095 [Notice] Bootstrapped 10%: Finishing handshake with directory server. Feb 08 08:58:38.099 [Debug] rectify_client_ciphers(): List was: ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:ECDH-RSA-AES256-SHA:ECDH-ECDSA-AES256-SHA:AES256-SHA:ECDHE-ECDSA-RC4-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-RC4-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:ECDH-RSA-RC4-SHA:ECDH-RSA-AES128-SHA:ECDH-ECDSA-RC4-SHA:ECDH-ECDSA-AES128-SHA:RC4-MD5:RC4-SHA:AES128-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:ECDH-RSA-DES-CBC3-SHA:ECDH-ECDSA-DES-CBC3-SHA:DES-CBC3-SHA: Feb 08 08:58:38.100 [Debug] rectify_client_ciphers(): Cipher 0: 300c00a ECDHE-ECDSA-AES256-SHA Feb 08 08:58:38.101 [Debug] rectify_client_ciphers(): Cipher 1: 300c014 ECDHE-RSA-AES256-SHA Feb 08 08:58:38.101 [Debug] rectify_client_ciphers(): Cipher 2: 3000039 DHE-RSA-AES256-SHA Feb 08 08:58:38.103 [Debug] rectify_client_ciphers(): Cipher 3: 3000038 DHE-DSS-AES256-SHA Feb 08 08:58:38.103 [Debug] rectify_client_ciphers(): Cipher 4: 300c00f ECDH-RSA-AES256-SHA Feb 08 08:58:38.104 [Debug] rectify_client_ciphers(): Cipher 5: 300c005 ECDH-ECDSA-AES256-SHA Feb 08 08:58:38.104 [Debug] rectify_client_ciphers(): Cipher 6: 3000035 AES256-SHA Feb 08 08:58:38.105 [Debug] rectify_client_ciphers(): Cipher 7: 300c007 ECDHE-ECDSA-RC4-SHA Feb 08 08:58:38.105 [Debug] rectify_client_ciphers(): Cipher 8: 300c009 ECDHE-ECDSA-AES128-SHA Feb 08 08:58:38.106 [Debug] rectify_client_ciphers(): Cipher 9: 300c011 ECDHE-RSA-RC4-SHA Feb 08 08:58:38.106 [Debug] rectify_client_ciphers(): Cipher 10: 300c013 ECDHE-RSA-AES128-SHA Feb 08 08:58:38.107 [Debug] rectify_client_ciphers(): Cipher 11: 3000033 DHE-RSA-AES128-SHA Feb 08 08:58:38.107 [Debug] rectify_client_ciphers(): Cipher 12: 3000032 DHE-DSS-AES128-SHA Feb 08 08:58:38.108 [Debug] rectify_client_ciphers(): Cipher 13: 300c00c ECDH-RSA-RC4-SHA Feb 08 08:58:38.108 [Debug] rectify_client_ciphers(): Cipher 14: 300c00e ECDH-RSA-AES128-SHA Feb 08 08:58:38.109 [Debug] rectify_client_ciphers(): Cipher 15: 300c002 ECDH-ECDSA-RC4-SHA Feb 08 08:58:38.109 [Debug] rectify_client_ciphers(): Cipher 16: 300c004 ECDH-ECDSA-AES128-SHA Feb 08 08:58:38.110 [Debug] rectify_client_ciphers(): Cipher 17: 3000004 RC4-MD5 Feb 08 08:58:38.110 [Debug] rectify_client_ciphers(): Cipher 18: 2010080 RC4-MD5 Feb 08 08:58:38.110 [Debug] rectify_client_ciphers(): Cipher 19: 3000005 RC4-SHA Feb 08 08:58:38.111 [Debug] rectify_client_ciphers(): Cipher 20: 300002f AES128-SHA Feb 08 08:58:38.111 [Debug] rectify_client_ciphers(): Cipher 21: 300c008 ECDHE-ECDSA-DES-CBC3-SHA Feb 08 08:58:38.112 [Debug] rectify_client_ciphers(): Cipher 22: 300c012 ECDHE-RSA-DES-CBC3-SHA Feb 08 08:58:38.112 [Debug] rectify_client_ciphers(): Cipher 23: 3000016 EDH-RSA-DES-CBC3-SHA Feb 08 08:58:38.113 [Debug] rectify_client_ciphers(): Cipher 24: 3000013 EDH-DSS-DES-CBC3-SHA Feb 08 08:58:38.113 [Debug] rectify_client_ciphers(): Cipher 25: 300c00d ECDH-RSA-DES-CBC3-SHA Feb 08 08:58:38.114 [Debug] rectify_client_ciphers(): Cipher 26: 300c003 ECDH-ECDSA-DES-CBC3-SHA Feb 08 08:58:38.114 [Debug] rectify_client_ciphers(): Cipher 27: 300000a DES-CBC3-SHA Feb 08 08:58:38.115 [Debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-AES256-SHA Feb 08 08:58:38.115 [Debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-AES256-SHA Feb 08 08:58:38.116 [Debug] rectify_client_ciphers(): Found cipher DHE-RSA-AES256-SHA Feb 08 08:58:38.116 [Debug] rectify_client_ciphers(): Found cipher DHE-DSS-AES256-SHA Feb 08 08:58:38.116 [Debug] rectify_client_ciphers(): Found cipher ECDH-RSA-AES256-SHA Feb 08 08:58:38.117 [Debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-AES256-SHA Feb 08 08:58:38.118 [Debug] rectify_client_ciphers(): Found cipher AES256-SHA Feb 08 08:58:38.118 [Debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-RC4-SHA Feb 08 08:58:38.119 [Debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-AES128-SHA Feb 08 08:58:38.119 [Debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-RC4-SHA Feb 08 08:58:38.120 [Debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-AES128-SHA Feb 08 08:58:38.121 [Debug] rectify_client_ciphers(): Found cipher DHE-RSA-AES128-SHA Feb 08 08:58:38.121 [Debug] rectify_client_ciphers(): Found cipher DHE-DSS-AES128-SHA Feb 08 08:58:38.122 [Debug] rectify_client_ciphers(): Found cipher ECDH-RSA-RC4-SHA Feb 08 08:58:38.122 [Debug] rectify_client_ciphers(): Found cipher ECDH-RSA-AES128-SHA Feb 08 08:58:38.123 [Debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-RC4-SHA Feb 08 08:58:38.124 [Debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-AES128-SHA Feb 08 08:58:38.124 [Debug] rectify_client_ciphers(): Found cipher RC4-MD5 Feb 08 08:58:38.124 [Debug] rectify_client_ciphers(): Skipping v2 cipher RC4-MD5 Feb 08 08:58:38.125 [Debug] rectify_client_ciphers(): Found cipher RC4-SHA Feb 08 08:58:38.125 [Debug] rectify_client_ciphers(): Found cipher AES128-SHA Feb 08 08:58:38.125 [Debug] rectify_client_ciphers(): Found cipher ECDHE-ECDSA-DES-CBC3-SHA Feb 08 08:58:38.126 [Debug] rectify_client_ciphers(): Found cipher ECDHE-RSA-DES-CBC3-SHA Feb 08 08:58:38.126 [Debug] rectify_client_ciphers(): Found cipher EDH-RSA-DES-CBC3-SHA Feb 08 08:58:38.126 [Debug] rectify_client_ciphers(): Found cipher EDH-DSS-DES-CBC3-SHA Feb 08 08:58:38.127 [Debug] rectify_client_ciphers(): Found cipher ECDH-RSA-DES-CBC3-SHA Feb 08 08:58:38.127 [Debug] rectify_client_ciphers(): Found cipher ECDH-ECDSA-DES-CBC3-SHA Feb 08 08:58:38.127 [Debug] rectify_client_ciphers(): Inserting fake SSL3_TXT_RSA_FIPS_WITH_3DES_EDE_CBC_SHA Feb 08 08:58:38.128 [Debug] rectify_client_ciphers(): Found cipher DES-CBC3-SHA Feb 08 08:58:38.128 [Debug] connection_tls_start_handshake(): starting TLS handshake on fd 11 Feb 08 08:58:38.128 [Debug] tor_tls_handshake(): About to call SSL_connect on 0x20be9d30 (Unknown state 24576) Feb 08 08:58:38.129 [Debug] tor_tls_handshake(): After call, 0x20be9d30 was in state SSL23_ST_CR_SRVR_HELLO_A Feb 08 08:58:38.129 [Debug] connection_tls_continue_handshake(): wanted read Feb 08 08:58:38.129 [Debug] tor_tls_handshake(): About to call SSL_connect on 0x20be9d30 (SSL23_ST_CR_SRVR_HELLO_A) Feb 08 08:58:38.130 [Debug] connection_tls_continue_handshake(): wanted read Feb 08 08:58:38.417 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:38.417 [Debug] tor_tls_handshake(): About to call SSL_connect on 0x20be9d30 (SSL23_ST_CR_SRVR_HELLO_A) Feb 08 08:58:38.418 [Debug] tor_tls_handshake(): After call, 0x20be9d30 was in state SSL3_ST_CR_SESSION_TICKET_A Feb 08 08:58:38.418 [Debug] connection_tls_continue_handshake(): wanted read Feb 08 08:58:38.646 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:38.646 [Debug] tor_tls_handshake(): About to call SSL_connect on 0x20be9d30 (SSL3_ST_CR_SESSION_TICKET_A) Feb 08 08:58:38.647 [Debug] tor_tls_handshake(): After call, 0x20be9d30 was in state SSL_ST_OK Feb 08 08:58:38.647 [Debug] tor_tls_handshake(): Server sent back a single certificate; looks like a v2 handshake on 0x20be9d30. Feb 08 08:58:38.648 [Debug] connection_tls_continue_handshake(): wanted read Feb 08 08:58:38.987 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:38.987 [Debug] connection_tls_continue_handshake(): wanted read Feb 08 08:58:39.227 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:39.228 [Debug] connection_tls_finish_handshake(): tls handshake with 50.7.249.43 done. verifying. Feb 08 08:58:39.229 [Debug] connection_or_check_valid_tls_handshake(): The certificate seems to be valid on outgoing connection with 50.7.249.43:993 Feb 08 08:58:39.229 [Info] connection_or_check_valid_tls_handshake(): Connected to router $956B9E3D11C26F77B8EC878ECC7C830A543867D2 at 50.7.249.43:993 without knowing its key. Hoping for the best. Feb 08 08:58:39.230 [Notice] Learned fingerprint 956B9E3D11C26F77B8EC878ECC7C830A543867D2 for bridge 50.7.249.43:993 Feb 08 08:58:39.231 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). Feb 08 08:58:39.232 [Debug] conn_write_callback(): socket 11 wants to write. Feb 08 08:58:39.233 [Debug] flush_chunk_tls(): flushed 9 bytes, 0 ready to flush, 0 remain. Feb 08 08:58:39.233 [Debug] connection_handle_write_impl(): After TLS write of 9: 3508 read, 1902 written Feb 08 08:58:39.459 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:39.460 [Debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384. Feb 08 08:58:39.462 [Debug] connection_read_to_buf(): After TLS read of 521: 586 read, 0 written Feb 08 08:58:39.462 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 521 (0 pending in tls object). Feb 08 08:58:39.463 [Info] command_process_versions_cell(): Negotiated version 2 with 50.7.249.43:993; sending NETINFO. Feb 08 08:58:39.463 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object). Feb 08 08:58:39.464 [Debug] circuit_n_conn_done(): or_conn to $956B9E3D11C26F77B8EC878ECC7C830A543867D2/50.7.249.43, status=1 Feb 08 08:58:39.465 [Debug] circuit_n_conn_done(): Found circ, sending create cell. Feb 08 08:58:39.465 [Debug] circuit_send_next_onion_skin(): First skin; sending create cell. Feb 08 08:58:39.466 [Notice] Bootstrapped 15%: Establishing an encrypted directory connection. Feb 08 08:58:39.468 [Debug] circuit_deliver_create_cell(): Chosen circID 49970. Feb 08 08:58:39.469 [Debug] append_cell_to_circuit_queue(): Made a circuit active. Feb 08 08:58:39.470 [Info] circuit_send_next_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>' Feb 08 08:58:39.471 [Info] command_process_netinfo_cell(): Got good NETINFO cell from 50.7.249.43:993; OR connection is now open, using protocol version 2 Feb 08 08:58:39.471 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). Feb 08 08:58:39.471 [Debug] conn_write_callback(): socket 11 wants to write. Feb 08 08:58:39.472 [Debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain. Feb 08 08:58:39.472 [Debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written Feb 08 08:58:39.473 [Debug] connection_or_flush_from_first_active_circuit(): Made a circuit inactive. Feb 08 08:58:39.473 [Debug] conn_write_callback(): socket 11 wants to write. Feb 08 08:58:39.473 [Debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain. Feb 08 08:58:39.474 [Debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written Feb 08 08:58:39.926 [Debug] global_read_bucket now 10485760. Feb 08 08:58:39.933 [Debug] global_write_bucket now 10485760. Feb 08 08:58:39.933 [Debug] global_relayed_read_bucket now 10485760. Feb 08 08:58:39.934 [Debug] global_relayed_write_bucket now 10485760. Feb 08 08:58:39.934 [Debug] or_conn->write_bucket now 10485760. Feb 08 08:58:39.990 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:39.995 [Debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384. Feb 08 08:58:39.996 [Debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written Feb 08 08:58:39.996 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object). Feb 08 08:58:39.997 [Debug] command_process_created_cell(): at OP. Finishing handshake. Feb 08 08:58:39.997 [Info] circuit_finish_handshake(): Finished building fast circuit hop: Feb 08 08:58:39.998 [Info] exit circ (length 1, exit 0000000000000000000000000000000000000000): $0000000000000000000000000000000000000000(open) Feb 08 08:58:39.998 [Debug] command_process_created_cell(): Moving to next skin. Feb 08 08:58:39.998 [Debug] circuit_send_next_onion_skin(): starting to send subsequent skin. Feb 08 08:58:39.999 [Info] circuit_send_next_onion_skin(): circuit built! Feb 08 08:58:39.999 [Notice] Bootstrapped 20%: Asking for networkstatus consensus. Feb 08 08:58:40.001 [Debug] connection_ap_handshake_attach_circuit(): Attaching apconn to circ 49970 (stream 2 sec old). Feb 08 08:58:40.002 [Info] exit circ (length 1): $0000000000000000000000000000000000000000(open) Feb 08 08:58:40.003 [Debug] link_apconn_to_circ(): attaching new conn to circ. n_circ_id 49970. Feb 08 08:58:40.004 [Debug] connection_ap_handshake_send_begin(): Sending relay cell to begin stream 16864. Feb 08 08:58:40.005 [Debug] relay_send_command_from_edge(): delivering 13 cell forward. Feb 08 08:58:40.005 [Debug] circuit_package_relay_cell(): crypting a layer of the relay cell. Feb 08 08:58:40.006 [Debug] append_cell_to_circuit_queue(): Made a circuit active. Feb 08 08:58:40.006 [Debug] append_cell_to_circuit_queue(): Primed a buffer. Feb 08 08:58:40.007 [Debug] connection_or_flush_from_first_active_circuit(): Made a circuit inactive. Feb 08 08:58:40.007 [Info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 49970 Feb 08 08:58:40.008 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). Feb 08 08:58:40.008 [Debug] conn_write_callback(): socket 11 wants to write. Feb 08 08:58:40.009 [Debug] flush_chunk_tls(): flushed 512 bytes, 0 ready to flush, 0 remain. Feb 08 08:58:40.009 [Debug] connection_handle_write_impl(): After TLS write of 512: 0 read, 586 written Feb 08 08:58:40.194 [Debug] conn_read_callback(): socket 11 wants to read. Feb 08 08:58:40.197 [Debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 16384. Feb 08 08:58:40.198 [Debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written Feb 08 08:58:40.198 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object). Feb 08 08:58:40.199 [Debug] relay_lookup_conn(): found conn for stream 16864. Feb 08 08:58:40.199 [Debug] circuit_receive_relay_cell(): Sending to origin. Feb 08 08:58:40.200 [Debug] connection_edge_process_relay_cell(): Now seen 1 relay cells here (command 3, stream 16864). Feb 08 08:58:40.200 [Info] connection_ap_process_end_not_open(): Edge got end (not a directory) before we're connected. Marking for close. Feb 08 08:58:40.200 [Info] exit circ (length 1): $0000000000000000000000000000000000000000(open) Feb 08 08:58:40.201 [Info] stream_end_reason_to_socks5_response(): Reason for ending (526) not recognized; sending generic socks error. Feb 08 08:58:40.202 [Debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). Feb 08 08:58:40.202 [Debug] conn_close_if_marked(): Cleaning up connection (fd -1). Feb 08 08:58:40.203 [Debug] connection_remove(): removing socket -1 (type Socks), n_conns now 7 Feb 08 08:58:40.203 [Info] _connection_free(): Freeing linked Socks connection [waiting for connect response] with 63 bytes on inbuf, 0 on outbuf. Feb 08 08:58:40.204 [Debug] conn_read_callback(): socket -1 wants to read. Feb 08 08:58:40.204 [Info] connection_dir_client_reached_eof(): 'fetch' response not all here, but we're at eof. Closing. Feb 08 08:58:40.205 [Debug] conn_close_if_marked(): Cleaning up connection (fd -1). Feb 08 08:58:40.205 [Info] connection_dir_request_failed(): Giving up on directory server at '50.7.249.43'; retrying Feb 08 08:58:40.205 [Debug] connection_remove(): removing socket -1 (type Directory), n_conns now 6 Feb 08 08:58:40.206 [Info] _connection_free(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf. Feb 08 08:58:40.866 [Debug] global_read_bucket now 10485760. Feb 08 08:58:40.868 [Debug] global_write_bucket now 10485760. Feb 08 08:58:40.870 [Debug] or_conn->read_bucket now 10485760. Feb 08 08:58:40.871 [Debug] or_conn->write_bucket now 10485760. Feb 08 08:58:48.882 [Info] smartlist_choose_by_bandwidth_weights(): Empty routerlist passed in to consensus weight node selection for rule weight as guard Feb 08 08:58:48.883 [Info] smartlist_choose_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard Feb 08 08:58:48.884 [Info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known) Feb 08 08:58:59.921 [Info] smartlist_choose_by_bandwidth_weights(): Empty routerlist passed in to consensus weight node selection for rule weight as guard Feb 08 08:58:59.923 [Info] smartlist_choose_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard Feb 08 08:58:59.925 [Info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known) Feb 08 08:59:10.954 [Info] smartlist_choose_by_bandwidth_weights(): Empty routerlist passed in to consensus weight node selection for rule weight as guard Feb 08 08:59:10.956 [Info] smartlist_choose_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard Feb 08 08:59:10.956 [Info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known) Feb 08 08:59:21.990 [Info] smartlist_choose_by_bandwidth_weights(): Empty routerlist passed in to consensus weight node selection for rule weight as guard Feb 08 08:59:21.992 [Info] smartlist_choose_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard Feb 08 08:59:21.992 [Info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known) Feb 08 08:59:32.017 [Info] smartlist_choose_by_bandwidth_weights(): Empty routerlist passed in to consensus weight node selection for rule weight as guard Feb 08 08:59:32.019 [Info] smartlist_choose_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard Feb 08 08:59:32.019 [Info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known) Feb 08 08:59:38.034 [Info] smartlist_choose_by_bandwidth_weights(): Empty routerlist passed in to consensus weight node selection for rule weight as guard Feb 08 08:59:38.036 [Info] smartlist_choose_by_bandwidth(): Empty routerlist passed in to old node selection for rule weight as guard Feb 08 08:59:38.037 [Info] should_delay_dir_fetches(): delaying dir fetches (no running bridges known) Feb 08 08:59:42.520 [Debug] conn_read_callback(): socket 10 wants to read. Feb 08 08:59:42.541 [Debug] conn_read_callback(): socket 10 wants to read. - -- SiNA pgp 0x0B47D56D On 02/08/2011 02:58 AM, Roger Dingledine wrote: > SafeLogging 0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJNUXcwAAoJEJPBwXYLR9Vt6lcP/0h0B8WA2PAYjBqw1gev9krm dNc5wWyrwB7O5HEr5whAdPQ5HOuE3kYqzQ7SgULJoWajwNncjRfgVTCsnJqsAMLW cs+r8uvadzYWxCrWk/23qdIQp9yA8dVlQKNSfdyYgDG/8l1DiEV/DS/XsAW7QgFx D+h4W1s6uML3U9Mi0nt7922hm1G6cScBZ+dokuwOXZrodQvVQ5JJuadBYp011GjD aAjqyXf5J8YvZld8Z8HWQwqeUsxJzIwgerKdid6A8G7fBrJvebLSAy/OA0wIK0tF OYkJ/JZ/R/CjHbvCzd5efcj0yHhHpOeMF9R79MZO9FGVPuyzeKwiy/l9YsqIfggk j25nRPdCXbFxU4GdyUVYI6adbF0QOc2Yqjq+ptqyUyRYhwS88rXwUATrBNa7uYwm PH6h1H134551lnhAmhT/V1D5qLr94kQyUrT234LOtrQJF97bQ/L+k094BQx+9kU1 kfKoIF56njsMENwfwBOlJEeUzZ7y2ghB/gKUQBA8jMe4Lw0qY7HKWGtcHuR3Wxr7 hOifaASzwFhdFA3bxvoIKRhTV+d9+RVcmASRt9hdDsd3ZE5AC6RYbGTqQ5UsAXHV Ia7fuGWk4MhLLUS48BsqulSnh3hluKyJnXbp6f4psySAj+5guWEzQN/03vwf5giu qWxfbhkCJ8/UVNssp6f9 =eU28 -----END PGP SIGNATURE-----