[tor-relays] Auto-discovered IPv6 address [...] has not been found reachable.
Onion Operator
flev at kpnmail.nl
Sat Mar 12 17:06:34 UTC 2022
> Fran wrote:
> Hej,
Hello,
>
> TLS handshake succeeds for me from my laptop:
>
> $ curl --insecure https://[2a02:a446:5ef1:1:d072:53ff:fef4:ea59] -v
> * Trying 2a02:a446:5ef1:1:d072:53ff:fef4:ea59:443...
> * Connected to 2a02:a446:5ef1:1:d072:53ff:fef4:ea59
> (2a02:a446:5ef1:1:d072:53ff:fef4:ea59) port 443 (#0)
> * ALPN, offering h2
> * ALPN, offering http/1.1
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
> * TLSv1.3 (IN), TLS handshake, Certificate (11):
> * TLSv1.3 (IN), TLS handshake, CERT verify (15):
> * TLSv1.3 (IN), TLS handshake, Finished (20):
> * TLSv1.3 (OUT), TLS handshake, Finished (20):
> * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
> * ALPN, server did not agree to a protocol
> * Server certificate:
> * subject: CN=www.s5uu2cs3ui4yok4.net
> * start date: Nov 2 00:00:00 2021 GMT
> * expire date: Apr 16 00:00:00 2022 GMT
> * issuer: CN=www.yi5r3anmk2gd3fbqrw4.com
> * SSL certificate verify result: unable to get local issuer certificate (20),
> continuing anyway.
>> GET / HTTP/1.1
>> Host: [2a02:a446:5ef1:1:d072:53ff:fef4:ea59]
>> User-Agent: curl/7.82.0
>> Accept: */*
>>
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> * old SSL session ID is stale, removing
> ^C
>
> What if you configure the IPv6 address by hand in torrc?
for months my torrc had
ORPort 443 IPv4Only
ORPort [2a02:a446:5ef1:1:d072:53ff:fef4:ea59]:443 IPv6Only
Address XXX
and read in the logs:
Unable to find IPv6 address for ORPort 443. You might want to specify
IPv4Only to it or set an explicit address or set Address.
(XXX had only the A record)
>
> Can you please send your torrc and the output of
--- cut here ---
ContactInfo flev @ kpnmail . nl
Nickname RealityLeighWinner
ExitPolicy reject *:*
ExitPolicy reject6 *:*
AvoidDiskWrites 1
DirPort 80
ORPort 443
Address XXX
--- cut here ---
where XXX is a DNS entry with both A and AAAA records.
>
> ip route show table all
default via 192.168.2.254 dev eth0
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.102
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1
broadcast 192.168.2.0 dev eth0 table local proto kernel scope link src 192.168.2.102
local 192.168.2.102 dev eth0 table local proto kernel scope host src 192.168.2.102
broadcast 192.168.2.255 dev eth0 table local proto kernel scope link src 192.168.2.102
::1 dev lo proto kernel metric 256 pref medium
2a02:a446:5ef1:1::/64 dev eth0 proto kernel metric 256 expires 257593sec pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium
default via fe80::7e39:53ff:fef6:d2cc dev eth0 proto ra metric 1024 expires 1464sec hoplimit 64 pref medium
local ::1 dev lo table local proto kernel metric 0 pref medium
local 2a02:a446:5ef1:1:d072:53ff:fef4:ea59 dev eth0 table local proto kernel metric 0 pref medium
local fe80::d072:53ff:fef4:ea59 dev eth0 table local proto kernel metric 0 pref medium
multicast ff00::/8 dev eth0 table local proto kernel metric 256 pref medium
> ip address show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether d2:72:53:f4:ea:59 brd ff:ff:ff:ff:ff:ff permaddr 00:1e:06:42:f9:14
inet 192.168.2.102/24 brd 192.168.2.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 2a02:a446:5ef1:1:d072:53ff:fef4:ea59/64 scope global dynamic mngtmpaddr
valid_lft 257524sec preferred_lft 171124sec
inet6 fe80::d072:53ff:fef4:ea59/64 scope link
valid_lft forever preferred_lft forever
BTW, it's also silly that the DirPort seems not effective. I can reach it from outside but don't
get it in the descriptor.
This the output of ss -plt:
LISTEN 0 4096 0.0.0.0:80 0.0.0.0:* users:(("tor",pid=992,fd=9))
LISTEN 0 4096 127.0.0.1:9050 0.0.0.0:* users:(("tor",pid=992,fd=6))
LISTEN 0 4096 0.0.0.0:443 0.0.0.0:* users:(("tor",pid=992,fd=7))
LISTEN 0 4096 [::]:443 [::]:* users:(("tor",pid=992,fd=8))
>
> tnx & ciao,
> fran
thanks
Oo.
More information about the tor-relays
mailing list