[tor-bugs] #3769 [Tor Relay]: Bufferevent-based server sometimes succeeds, sometimes fails.
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Fri Aug 19 22:34:40 UTC 2011
#3769: Bufferevent-based server sometimes succeeds, sometimes fails.
-----------------------+----------------------------------------------------
Reporter: nickm | Owner:
Type: defect | Status: new
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version:
Keywords: | Parent: #3561
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Sebastian reports that his server (debian, tor master, libevent
patches-2.0) gets lots of "TLS error while handshaking (with bufferevent)
with [scrubbed]: ssl handshake failure (in SSL
routines:SSL3_READ_BYTES:SSL3_ST_SR_CERT_A)" warnings. Those imply that
(some? all?) connections aren't making it in.
Additionally, his circuit timeouts seem to increase and increase. Perhaps
some outgoing connections aren't working.
So tentatively, I'm going to guess that the situation is: sometimes
outgoing connections succeed, and sometimes they fail. Sometimes incoming
connections succeed, and sometimes they fail.
The first thing to ask is, is that right? Or was I mistaken when I
thought that incoming connections work sometimes?
Second thing to ask is, is there any pattern to which hosts work and which
don't? Are hosts in "mostly working" and "mostly not working" classes, or
does each conn fail more or less at random? Are the ones that work with
incoming conns the same as the ones that work with outgoing conns?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3769>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list