#19926: BUG warning in connection_ap_attach_pending: waiting for rendezvous 
desc :*
 Reporter:  cypherpunks                          |          Owner:  dgoulet
     Type:  defect                               |         Status:
                                                 |  accepted
 Priority:  Low                                  |      Milestone:  Tor:
                                                 |  unspecified
Component:  Core Tor/Tor                         |        Version:  Tor:
 Severity:  Normal                               |     Resolution:
 Keywords:  bug, regression, tor-hs,             |  Actual Points:
  refactoring, easy                              |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:

Comment (by cypherpunks):

 > I'm a bit doubtful that iptables can break the SOCKS requests here
 unless it is applied on localhost and the SocksPort... would be a bit

 I use `iptables` everywhere, but in this particular issue it was tor
 browser inside VM (guest OS) connected to system tor running on host
 system (host OS). Thus, tor's `SocksPort` is listening on some bridge
 interface, which is seen also inside VM (transparent tor proxy is not
 used). Connections on this bridge are filtered with `iptables`.

 > To hunt down this, it is mostly refactoring at this point to try to hunt
 it down.

 Well, let us see whether it can be caught after refactoring of tor code...

Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19926#comment:30>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
tor-bugs mailing list

Reply via email to