[tor-bugs] #20462 [Core Tor/Tor]: Make test failures/bugs on Raspberry Pi 3
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Nov 9 14:23:39 UTC 2016
#20462: Make test failures/bugs on Raspberry Pi 3
-------------------------------------------+-------------------------------
Reporter: cypherpunks | Owner:
Type: defect | Status: closed
Priority: Medium | Milestone: Tor:
| 0.2.9.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution: fixed
Keywords: regression, TorCoreTeam201611 | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------+-------------------------------
Changes (by cypherpunks):
* status: new => closed
* resolution: => fixed
Comment:
I've tested again with 0.2.9.5 (I disabled the firewall prior to running
'make test', the box doubles as a wireless access point) and the only
failing test was:
control/rend_service_parse_port_config:
FAIL src/test/test_controller.c:190: assert(!cfg)
[rend_service_parse_port_config FAILED]
I dug into it a bit further and it turns out the router used the ISP
(virgin media) do something weird/evil with dns queries that don't resolve
(in this case "1.2.3.4.5" from the testcase), the dns query was returning
the isps safe search page. I hadn't noticed this before as everything
apart from the router uses a differently evil dns provider - a long way of
saying its probably fine to close this.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20462#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list