> On 16 Feb 2017, at 19:57, Markus <[email protected]> wrote: > >> >> What version of tor are you running? > > root@dragino:~# /etc/init.d/tor restart > Feb 16 08:14:52.049 [notice] Tor v0.2.2.39 (git-bec76476efb71549). This > is experimental software. Do not rely on it for strong anonymity. > (Running on Linux mips)
Tor 0.2.2.39 is very old: it has many known severe security issues. I am surprised it believes enough directory authorities to bootstrap: it could stop working at any time. It uses older protocols: I think they are all still supported, but they might not work very well on the current network. (You can't run a relay on versions that old, but clients might work.) > cannot find a newer package for openwrt/yun It might be worth compiling one yourself. >> It would be very helpful to have the hidden service logs > > couldn't find any. > had to activate logs in torrc. > now here we go: > https://pad.riseup.net/p/oigEOGIBVKYXJFNGAORI It looks like the hidden service isn't posting a descriptor. Can you please send the info-level logs from the hidden service? T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org ------------------------------------------------------------------------
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ tor-onions mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
