> On 16 Feb 2017, at 19:57, Markus <m...@euse.de> wrote:
> 
>> 
>> What version of tor are you running?
> 
> root@dragino:~# /etc/init.d/tor restart
> Feb 16 08:14:52.049 [notice] Tor v0.2.2.39 (git-bec76476efb71549). This
> is experimental software. Do not rely on it for strong anonymity.
> (Running on Linux mips)

Tor 0.2.2.39 is very old: it has many known severe security issues.

I am surprised it believes enough directory authorities to bootstrap:
it could stop working at any time.

It uses older protocols: I think they are all still supported, but they
might not work very well on the current network.
(You can't run a relay on versions that old, but clients might work.)

> cannot find a newer package for openwrt/yun

It might be worth compiling one yourself.

>> It would be very helpful to have the hidden service logs
> 
> couldn't find any.
> had to activate logs in torrc.
> now here we go:
> https://pad.riseup.net/p/oigEOGIBVKYXJFNGAORI


It looks like the hidden service isn't posting a descriptor.
Can you please send the info-level logs from the hidden service?

T

--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------



Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
tor-onions mailing list
tor-onions@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions

Reply via email to