Tor Browser 7.0.10 is released

by boklm | November 14, 2017

Tor Browser 7.0.10 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

This release updates Firefox to version 52.5.0esr and Tor to version version 0.3.1.8, the second stable release in the 0.3.1 series. In addition to that we updated the HTTPS Everywhere and NoScript extensions we ship. For Windows users we backported patches from the alpha series that update the msvcr100.dll runtime library we include and which should make Tor Browser more robust against crashes due to misbehvaing third party software.

The full changelog since Tor Browser 7.0.9 (7.0.8 for Windows) is:

  • All Platforms
    • Update Firefox to 52.5.0esr
    • Update Tor to 0.3.1.8
    • Update Torbutton to 1.9.7.10
      • Bug 23997: Add link to Tor Browser manual for de, nl, tr, vi
      • Translations update
    • Update HTTPS-Everywhere to 2017.10.30
      • Bug 24178: Use make.sh for building HTTPS-Everywhere
    • Update NoScript to 5.1.5
      • Bug 23968: NoScript icon jumps to the right after update
  • Windows
    • Bug 23582: Enable the Windows DLL blocklist for mingw-w64 builds
    • Bug 23396: Update the msvcr100.dll we ship
    • Bug 24052: Block file:// redirects early

Comments

Please note that the comment area below has been archived.

November 14, 2017

Permalink

NoScript is still on the right after this update. Should I be worried that I have a different fingerprint than the others? I'm on Trisquel x86 BTW...

I would like to add No Script is also still on the right on my screen, if that makes any difference. Also again, many thank yous to all who work so hard on Tor.

November 17, 2017

In reply to boklm

Permalink

Yes, It was already there before the update. I installed a new one and NoScript still moved to the right after relaunching (Ctrl+Shift+U) it today. However I got a "yes" result in "Does your browser protect from fingerprinting?" after testing it with EFF's Panopticlick, so I guess it should be fine.

November 14, 2017

Permalink

Very Thanks to all who work on This Tor this Program is for Save the Internet and Keep The World Clean from Hacking and Profit

My best Regards on you

November 14, 2017

Permalink

New user and want to donate . this network fills secure .Which is the best way?

November 14, 2017

Permalink

please update

Bug 23997: Add link to Tor Browser manual for kw, om

November 15, 2017

Permalink

Beautiful work devs!

Pretty please can we get level 3 content sandboxing in FF 57 patched to work with Linux Tor Browser? :-)

January 23rd the Firefox 59 beta drops, which will be the basis for ESR 59 in March. Mark your calendar as it ought to be the best time to prepare for the first TBB based on this ESR.

November 15, 2017

Permalink

09:15:43.600 DOMException [InvalidStateError: "A mutation operation was attempted on a database that did not allow mutations."
code: 11
nsresult: 0x80660006
location: resource://gre/modules/commonjs/toolkit/loader.js -> resource://devtools/shared/async-storage.js:80] 1 Promise-backend.js:935

November 15, 2017

Permalink

lot of Updates! on and on and on! when reaches to its end? Terrorists and suicide bombers, mass shooters etc, doing freely, but internet users are not free! why internet users are under intense surveillance, but Terrorists acting freely?
How one could be sure about theses ridiculous Zeros and Ones which come and get out of PC's, not to be seen by third parties, adversaries, terrorist regimes installed by U.S.A,?
just some ridiculous Green lock or some jumping relays, could prevent third parties watch our communications?
who don't know that every signal on all over the planet Earth are traceable, view-able and decodable, by surveillance centers? just an easy Dos command like "netstat/n" can show you after running the Tor browser, other creepy connections get you in touch and exploit your data stream!
watch out Tor users, there's no lock in all the world that could not have got a correct key.

you are misinformed :
- internet users will be free when isp & free-lance actors (often illegally) will pay their activities done against the users : the contract between a client and a service is not at all in favor of the client (the users) ; it is a commercial matter not a politic one.
- a terrorist regime is a rogue-state like france e.g , in a true democracy/republic it can't happen & usa does not install it (imo).
- most of signals are encrypted and not traceable , it is not because you 'see' that you 'know' (imo).
The danger is not (in my own opinion) about Tor or Tor network.
It should be far better if encryption was legalized as a fundamental right and if our lives were respected as our own propriety : it is a matter of force/will of a whole people/region not a police one.

November 15, 2017

Permalink

i strongly disagree with your self-satisfaction :
- security.enable_tls
- network.IDN_show_punycode
- security.ssl3
and why do you not implement a Calomel-add-on version (it does not connect at the network_passive addon : privacy respected) ?
i need a secure Tor Browser not a windows_cop_toy !

November 15, 2017

In reply to boklm

Permalink

Tor is not a secure browser but a government/google compliant.
This has been answered in this ticket : firefox is poorly secured ...
The Users need a secure browser not a jc jones for guru.
This has been written in this ticket: https://trac.torproject.org/projects/tor/ticket/24239

Every one does now know that clearly , Tor & firefox & https (gmail&google !!!) are not on the line they claim ; they are running like an electric car , just following the same rules, the same roads, it sounds like anonymous means in your mind/brain 'without identity/personality walking slowly blind & deaf until the retreat : the maffia blues.
If you have built just a foss version of internet explorer (microsoft innovation = google = Tor Browser) it is a big misunderstood !
The users of the net do not need & want that & you still wonder why so few people are using Tor ?
my firefox is less anonymous and i can't access to the onions but it is more secure and Onions are useless if it is an open door and it is a big & large window that you open without securing better Tor.
Tor is not built privacy & security in mind : it is a false assertion, a lie ; it is just a microsoft joint-venture with free software foundation : hypocrite.

November 16, 2017

In reply to gk

Permalink

The time has changed !
Your 'template' https://sedvblmbog.tudasnich.de/projects/torbrowser/design/ (design document written for the version 6.1) is your project but we need something else & better now.
Before it was a new idea re-appropriating a free space , now we want move together with trust in mind , and tomorrow it will be different.

I suppose you hide the users behind 30 millions of civil servant (gov compliant etc.) & behind a professional-commercial flux (google_microsoft_gmail etc.) but you provide a link which said "des is secure (& rc4 too !)" because it is a govt demand ... so your idea of legality means a deal like a secret shared between a state and a personal opinion : both are the same person involved in an imaginary and a very small world : a retarded dream without autonomy (who was the ideal/model user ?).

I admit that your client are your sponsors and follow the u.s request but in this case, it is for them only : a reserved-private tool which the term 'privacy' implies your own concept & their will.
It is not exportable and not an universal translation of a genuine right.
So your presentation [The Tor Project is a US 501 non-profit dedicated to the research, development, and education of online anonymity and privacy & You are now free to browse the Internet anonymously] is an intellectual lie , a dishonest assertion in every word & comma.

I should add that you act with bad faith : you are not behind mozilla you are in front of it as soon as you run tor.
You cannot offer better than mozilla if you do not first built yours then add your tor config : you did not , you take it as a source without accepting the idea to first harden yours and you are wrong : the sites - even the most obscure, old, reticent - must update their configuration to enter in the xxi century or must be avoided (https is one example, cypher is another one ...). I, i should not be confidence in my army; police force or another public service -elective dpt e.g- and unknown friends or enemies if the contact (surfing is one example, emailing is another one...) was not secure and anonymous.

It is not an angry, geek, absurd, paranoid feeling. It is just a minimum to be safe ; a secure Tor Browser not a cop_toy.

It is obvious, clear and sane : Tor Browser is not built privacy/security in mind ... just a cheat code, a proof of concept for the fun ... and does not provide the anonymity level that they claim.

November 19, 2017

In reply to gk

Permalink

The critic make sense in a general way on the attitude of mozilla.

They (mozilla) are marketing a privacy imago while they do not really make a real effort to work on it.
They publish reports on privacy, they support Tor and Tails which is all nice but these are big company tactics of walking to different roads. The marketing road for public association for the brand and the quite separate road for their own products.

Why deliver a browser with privacy options that are deactivated when you install it?
They know most users are installing products and go along without making a study of all the settings.

Why making the preferences panel 'easier' but actually hiding options so people have to work on a complete lost of about config settings to make this browser shut up and work?

But the best illustration is on their mobile products.
Now tell me, if you really are a privacy minded company, why the X are you releasing two versions of your mobile browser, a non privacy minded browser and a 'special' browser that has privacy options?

Why were they keeping up the system requirements higher (smaller market segment) for the privacy minded browser?
Why is there a huge difference between onion browser system requirements (systems req. lower is a broader market is better for more users) and the so called special privacy browser from firefox?
The standard browser on mobile is already for years a total anti privacy minded browser.

The desktop browser version of mozilla is for years a total pain in the privacy head because after every release on has to make a study of what they secretly changed, removed, added that might affect your privacy and make you work on the about:config again.
This is not a problem for users but also for developers, big privacy bugs in Torbrowser because at mozilla side they added something fancy again.

So, yes, in a way that poster has a point on attitude which is also illustrated here.
https://bugzilla.mozilla.org/show_bug.cgi?id=1408647

Question to Torproject, are you going to follow Mozilla ignoring policies or really protect your Torbrowser users by reconsidering the Certificate Authority section.
You should because it is better to be safe that sorry afterwards and it is total madness to ignore loud signals of reality. Especially when you do not have to search for them but getting them as feedback.

Nobody asks you to bite in the hand that is feeding you.
But since Torbrowser is already a modification of the mozilla browser it should not be a problem to defend your users for the ignoring policies and mistakes your feeder is making.

Be convincing in your decisions when people are concerned and act to it because, many countries are trying to control the internet by themselves or by cooperating together.
Therefore it should be better that the Tornetwork is not only hosted in the western 5-19 eyes world and you really should look over and over again to what you trust in your browser.

To me that is the implicit message in the posting of the other person writing.

November 15, 2017

Permalink

I think I must have a counterfeit download... my "HTTPS Everywhere" extension says it is from "eff.software.projects@gmail.com" which is obviously not legit (if it was really from EFF I'm sure they would use an eff.org email address). Please advise.

November 15, 2017

In reply to boklm

Permalink

And just to clarify further: the EFF is using a Gmail simply because that's required for putting the extension in the Google Chrome Addon Store.

November 15, 2017

Permalink

Is this ok or suspect?

15/11/2017 12:40:22.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15/11/2017 12:40:22.100 [NOTICE] Opening Socks listener on 127.0.0.1:9150
15/11/2017 12:40:23.000 [NOTICE] Bootstrapped 80%: Connecting to the Tor network
15/11/2017 12:40:23.800 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop
15/11/2017 12:40:23.800 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
15/11/2017 12:40:24.400 [NOTICE] Bootstrapped 90%: Establishing a Tor circuit
15/11/2017 12:40:24.500 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
15/11/2017 12:40:24.500 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
15/11/2017 12:40:24.600 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
15/11/2017 12:40:24.600 [NOTICE] new bridge descriptor 'griinchux' (fresh): $011F2599C0E9B27EE74B353155E244813763C3E5~griinchux at 85.31.186.98
15/11/2017 12:40:24.600 [NOTICE] new bridge descriptor 'zipfelmuetze' (fresh): $91A6354697E6B02A386312F68D82CF86824D3606~zipfelmuetze at 85.31.186.26
15/11/2017 12:40:24.700 [NOTICE] Bridge 'NX01' has both an IPv4 and an IPv6 address. Will prefer using its IPv4 address (85.17.30.79:443) based on the configured Bridge address.
15/11/2017 12:40:24.700 [NOTICE] new bridge descriptor 'NX01' (fresh): $FC259A04A328A07FED1413E9FC6526530D9FD87A~NX01 at 85.17.30.79
15/11/2017 12:40:24.800 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
15/11/2017 12:40:25.000 [NOTICE] new bridge descriptor 'cymrubridge31' (fresh): $C8CBDB2464FC9804A69531437BCF2BE31FDD2EE4~cymrubridge31 at 38.229.1.78
15/11/2017 12:40:25.100 [NOTICE] new bridge descriptor 'ndnop5' (fresh): $BBB28DF0F201E706BE564EFE690FE9577DD8386D~ndnop5 at 109.105.109.147
15/11/2017 12:40:25.100 [NOTICE] new bridge descriptor 'LeifEricson' (fresh): $A09D536DD1752D542E1FBB3C9CE4449D51298239~LeifEricson at 83.212.101.3
15/11/2017 12:40:25.200 [NOTICE] new bridge descriptor 'ndnop3' (fresh): $8DFCD8FB3285E855F5A55EDDA35696C743ABFC4E~ndnop3 at 109.105.109.165
15/11/2017 12:40:25.300 [NOTICE] Tor has successfully opened a circuit. Looks like client functionality is working.
15/11/2017 12:40:25.300 [NOTICE] Bootstrapped 100%: Done
15/11/2017 12:40:25.300 [NOTICE] new bridge descriptor 'cymrubridge33' (fresh): $0BAC39417268B96B9F514E7F63FA6FBA1A788955~cymrubridge33 at 38.229.33.83
15/11/2017 12:40:26.000 [NOTICE] new bridge descriptor 'frosty' (fresh): $88CD36D45A35271963EF82E511C8827A24730913~frosty at 37.218.240.34
15/11/2017 12:40:26.300 [NOTICE] new bridge descriptor 'dragon' (fresh): $D9A82D2F9C2F65A18407B1D2B764F130847F8B5D~dragon at 37.218.245.14
15/11/2017 12:40:26.500 [NOTICE] New control connection opened from 127.0.0.1.
15/11/2017 12:40:26.600 [NOTICE] New control connection opened from 127.0.0.1.
15/11/2017 12:42:31.100 [WARN] Proxy Client: unable to connect to 154.35.22.12:4304 ("general SOCKS server failure")
15/11/2017 12:42:31.100 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
15/11/2017 12:42:31.100 [WARN] Proxy Client: unable to connect to 154.35.22.9:80 ("general SOCKS server failure")
15/11/2017 12:42:31.100 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
15/11/2017 12:42:31.100 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")

November 20, 2017

In reply to gk

Permalink

Thank you.
Do you change basic bridges shipped on every version of Tor Browser?
I have made a new and fresh install of Tor Browser Bundle, problem seams to be solved.

November 15, 2017

Permalink

Подскажите пожалуйста, у меня TOR подключается к remote address johndeere.ratwerks.com по imaps
Так должно быть или нет?

Извините я не специалист в этом и мне трудно разобраться в документации на английском языке, но насколько я понял TOR одновременно работает только с одним входным узлом и все соединения которые он открывает, направляются через него (так показывает программа Tcpview).

А здесь получается одновременно два удаленных узла с которыми работает TOR и один из них johndeere.ratwerks.com передача на который идёт по почтовому протоколу imap (143 порт).

Я всего лишь хотел получить простой ответ.

Простой ответ по ссылке. Узел является входной точкой Tor. Все в порядке.
Порт может быть любым, хоть http. Соединений может быть несколько, они могут открываться, закрываться, ждать и т.д. Если не специалист, зачем смотреть соединения, которые для специалистов? :-) Все у вас ок с этим соединением, не переживайте.

November 16, 2017

In reply to boklm

Permalink

FANTASTIC! Just what I was hoping for. For a couple weeks there I thought Windows would have some implied superiority complex over a bug in e10s until ESR 59. Phew. It also makes it clear TPO doesn't endorse the usage.

Another question: Does TBB rely entirely on sandboxing functionality provided by Mozilla? Meaning level 3 happens with ESTR 59?

November 19, 2017

In reply to boklm

Permalink

mmHmm, I saw that. So then since level 3 is part of "NEXT" that would suggest what is needed is a somewhat stable NEXT like v59b in January (basis of ESR NEXT). That, or redo some work in the 2mo in-between, just to prolong the life expectancy of ESR 52 based TBB...until at most Julyish. +1 for as soon a transition as possible!

November 15, 2017

In reply to boklm

Permalink

Thanks. Good idea not to hurry with the new browser so many bugs can fixed till July 2018

There is at least one alpha before we switch to a new ESR, usually two to test fixups before they reach release. We have the ff59-esr keyword to track tickets we deem important for the next switch: https://trac.torproject.org/projects/tor/query?status=accepted&status=a… feel free to pick any of them not assigned to someone in particular and start working on them. That's really appreciated or just ask on the tbb-dev mailing list or on #tor-dev on the OFTC IRC network if unsure. Thanks.

November 15, 2017

Permalink

With the last update to 7.0.10, *all* the files in my TBB folder, even in /tor-browser/Browser/Downloads, have an identical timestamp (the one of the update on my machine, I guess). Is that expected behaviour (which would be not so good), or a bug (which would be not good at all), or something that indicates my machine was compromised in some way (which would be less bad for everyone, yet much worse for myself)?
Appreciate any reply, I am really worried here.

November 15, 2017

Permalink

1. Damn gvfsd-metadata bug every version
2. Tor circuit for this site: Bridge (Germany) - Relay (Germany) - Exit (Germany)-Internet

Tor project is a part of a CIA :)

November 15, 2017

Permalink

Anyone else found that upgrading from TBB 7.0.7 to TBB 7.0.10 breaks embedded webextensions?

I'm aware that Mozilla are dropping support for embedded webextensions in FF57, but TBB 7.0.10 is meant to be based on FF 52.5.0 - did Mozilla do something weird between 52.4.1 and 52.5.0?

November 15, 2017

Permalink

Installing the new Version 7.0.10 on Windows 10 actual Version I get the error message:
"Tor Browser does not have permission to access the profile. Please adjust your file system permissions and try again."
What can I do?

November 15, 2017

Permalink

ublock origin doesn't filer ads anymore right? the button formerly displayed in the toolbar has disappeared too.

November 15, 2017

Permalink

During my work with buggy HS I noticed this:

XX:21:37.000 [notice] Rend stream is 120 seconds late. Giving up on address '[scrubbed].onion'.
XX:26:59.000 [notice] Short path bias probe response length field (1).
XX:30:54.000 [notice] Rend stream is 120 seconds late. Giving up on address '[scrubbed].onion'.

I suspect it is some bug (message "Short path bias probe response length field"). Time of this message corresponds to a moment when HS stopped working. I have no idea about its relation to old ticket #8962.

Is it dangerous message? Is it sign of attack against tor client?

November 16, 2017

Permalink

As always it was, with this version it is also:

./start-tor-browser: line 368: 1651 Segmentation fault TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} ./firefox --class "Tor Browser" -profile TorBrowser/Data/Browser/profile.default "${@}" < /dev/null

JS is disabled, security slider is "high". I don't know how to reproduce.

November 19, 2017

In reply to gk

Permalink

Debian jessie, 64 bit, TBB in VM, tor is on host OS, no pulseaudio. Slider was at high. I think it is safe to debug with gdb, because my VM doesn't have access to tor guards, etc. So, the leak is only my exit node or particular HS used at that time, I could tolerate that. Actually, TBB with JS enabled crashes even more often.

Please, explain me how to use gdb. Ideally I would like to run just another version of tor browser which writes detailed log useful for you. Do I need to enable core dumps somewhere in sysctl?

The situation with the tor itself is much worse, because it is impossible to debug without disclosing too much about my IP, guard, and my tor chains. Maybe tor project needs to think how to address this problem (creation of safe tor debug log).

November 20, 2017

In reply to gk

Permalink

Thanks! I followed the instructions on link you gave me. So, as I understand, after downloading, unzipping, etc., in my starting script I need to do this:

$ ulimit -c unlimited
$ cd $HOME/tor-browser_en-US
$ gdb -x commands ./Browser/firefox ./Browser/core

where commands is a file with the content:

set env LD_LIBRARY_PATH=Browser/TorBrowser/Tor
run -profile Browser/TorBrowser/Data/Browser/profile.default
quit

Then, if torbrowser crashes, I need to give you just a (compressed) file core, that's all? I checked it, and indeed, it seems working this way.

However, fonts in address line and in interface elements in torbrowser now look different. I guess it is because torbrowser is not started through start-tor-browser script, i.e. some libraries may not be loaded. So, do I have risk to be profiled when running TBB in gdb?

Also, I don't understand why I see this complaint:

/home/user/tor-browser_en-US/./Browser/core: No such file or directory.

Is something wrong with the command "gdb -x commands ./Browser/firefox ./Browser/core"? If I kill torbrowser with -9, core file is created in directory tor-browser_en-US, and not in tor-browser_en-US/Browser as specified by command.

By the way, (I don't know if it is normal or not) if I do just this, it gives error:

$ ./Browser/firefox
./Browser/firefox: /usr/lib/x86_64-linux-gnu/libstdc++.so.6: version `GLIBCXX_3.4.21' not found (required by ./Browser/firefox)

Finally, I don't know if it matters or not, but I have only dbus libraries installed and not dbus itself (usually I have no problems with this setup). My /etc/machine-id file is empty. So, I see some complaints about it at each TBB startup, but everything works. I don't think that crashes are related to these things.

November 20, 2017

In reply to gk

Permalink

In addition to my previous comment:

Indeed, fonts are not the same, because start-tor-browser script exports few fonts-related variables. Now I have tried to be as close to this script as possible when running my torbrowser in gdb. Finally, I arrived at this way:

Start torbrowser using script:

-----
#!/bin/sh

ulimit -c unlimited
cd $HOME/tor-browser_en-US

if [ ! -d ".config/ibus" ]; then
mkdir -p .config/ibus
ln -nsf ~/.config/ibus/bus .config/ibus
fi

gdb -x $HOME/bin/commands.1 ./Browser/firefox ./Browser/core
-----

Here file commands.1 is:

set env XAUTHORITY=/home/username/.Xauthority
set env HOME=/home/username/tor-browser_en-US
set env LD_LIBRARY_PATH=Browser/TorBrowser/Tor
set env FONTCONFIG_PATH=Browser/TorBrowser/Data/fontconfig
set env FONTCONFIG_FILE=fonts.conf
run -profile Browser/TorBrowser/Data/Browser/profile.default
quit

Now fonts look normal as with usual TBB, and no extra files are created in home dir (like ~/Desktop). Is it correct configuration to start using my "gdb-version" TBB as usual browser? Do I still have any profiling risks?

November 20, 2017

In reply to gk

Permalink

P.S. I'm sorry for being messed with paths... Well, the correct version I mean is:

1) Script to start browser:

#!/bin/sh

ulimit -c unlimited
cd $HOME/tor-browser_en-US/Browser
if [ ! -d ".config/ibus" ]; then
mkdir -p .config/ibus
ln -nsf ~/.config/ibus/bus .config/ibus
fi
gdb -x $HOME/bin/commands ./firefox ./core

2) $HOME/bin/commands file:

set env XAUTHORITY=/home/username/.Xauthority
set env HOME=/home/username/tor-browser_en-US/Browser
set env LD_LIBRARY_PATH=TorBrowser/Tor
set env FONTCONFIG_PATH=TorBrowser/Data/fontconfig
set env FONTCONFIG_FILE=fonts.conf
run -profile TorBrowser/Data/Browser/profile.default
quit

If you want to debug your crash there is not need to mess with any start scripts or write your own.

1) Just download the debug symbols (the large .zip file) and make sure everything lands properly in Browser/.debug
2) Follow the "Starting firefox from inside gdb" instructions

Reading your above comments it seems this is kind of working for you? If so, you might want to play with the Browser/start-tor-browser script figuring out what exactly it is that breaks your setup.

November 22, 2017

In reply to gk

Permalink

If you want to debug your crash there is not need to mess with any start scripts or write your own.

Well, I was a bit confused. I thought that I need to specify some core file during start of program to get it created during a crash. Actually, it is not so, as I understood it later... So, normally I should start gdb on firefox without any core file, as it will be automatically created if crash happens. Then, if crash has happened with some core file created, I can run firefox on this core file and investigate it (creating stack trance, etc.). I hope, now I am correct. :)

Reading your above comments it seems this is kind of working for you?

Yes, everything works. I downloaded, unzipped, all right. Core file is created if firefox is killed. But I want this working smoothly as an everyday usage of torbrowser, that's why I need to care about all variables, correct fonts, and absence of profiling (because of some possible misconfiguration).

If so, you might want to play with the Browser/start-tor-browser script figuring out what exactly it is that breaks your setup.

It is not breaking. Everything works. At least, I cannot see any visual differences with normal TBB (i.e. without gdb). Yes, it doesn't mean there are no such differences.

Initially I thought that gdb doesn't take environment variables from my shell before running the program, that's why I tried to pass all necessary variables to firefox after gdb is launched. Now I see this is wrong. So, gdb can safely get all necessary variables from shell, i.e. I simply need just to edit that lines of start-tor-browser script, where firefox is launched, by replacing them with a proper gdb command.

To be clear: Since most of crashes are not easily reproducible, my intention is to use gdb with torbrowser by default. Then, if crash happens in some future, I will come here with useful backtrace and a core file. I hope it will make TBB more secure and will help the community to catch yet unknown torbrowser 0-days.

November 23, 2017

In reply to gk

Permalink

Thank you for the help! Yes, my TBB now can work both with and without gdb. Crashes usually happen rarely (I don't think that more than once in a week), but I almost sure that once I'll get them in my future. It should be interesting to analyze... (Well, it may be also due to other possible reasons: bug in other Linux libraries or kernel, hardware bugs, etc.).

November 24, 2017

In reply to gk

Permalink

Finally, the hack with these extra 6 lines is working:

-----
$ diff start-tor-browser.new start-tor-browser.original
116,119d115
< --gdb)
< use_gdb=1
< shift
< ;;
367,369d362
< [[ "$use_gdb" -eq 1 ]] && TOR_CONTROL_PASSWD=${TOR_CONTROL_PASSWD} gdb \
< -ex "run --class 'Tor Browser' -profile TorBrowser/Data/Browser/profile.default ${@} < /dev/null" \
< -ex quit ./firefox ||
-----

I added one switch --gdb, so now one can use both ways. Without gdb:
$ ./start-tor-browser -v
With gdb:
$ ./start-tor-browser -v --gdb

If you like it, you could add some similar functionality to start-tor-browser script (at the moment I don't care about regimes and options other than -v, but it can be easily applied to all places in the script, where firefox is launched).

Finally, the hack with these extra 6 lines is working

P.S. In addition, though ulimit is unlimited by default, one still needs to add the line
ulimit -c unlimited
somewhere at the start of start-tor-browser script. Otherwise, core file will not be created.

November 16, 2017

Permalink

tor browser can be resuscitated in china, if we use a socks-5 proxy server as vanguard.

November 16, 2017

Permalink

Is it safe to use Vidalia(.exe)? I find it indispensable for viewing and playing with Tor circuits.

Should the control port in Vidalia be 9150 or 9151? Thanks.

November 20, 2017

In reply to boklm

Permalink

No I downloaded the complete TB and when it starts it is maximized and without the S. After a restart the S seems Ok, but again TB is maximized. This has been this way in several recent versions of TB.

November 21, 2017

In reply to gk

Permalink

Screen resolution: 915×539 24-bit TrueColor (working area: 902×539)
x window manager alias mutter

All from debian live 9 stretch on an old toshiba satellite

November 16, 2017

Permalink

It's impossible access the options / dashboard of uBlock, the symbol is gone too. Which means it can't be customized anymore. No way to add filters or make exceptions.
Please tell me that's a bug and not a 'feature'

November 17, 2017

In reply to gk

Permalink

I assumed it to be an issue of Tor Browser itself but you are correct, it's only Tails, sorry.

November 16, 2017

Permalink

Tor is being blocked by the City of Brampton in Canada public wireless access. The pubkic IP is 192.82.150.249. the Tor browser isn't able to ocmplete its inital connection when opened. Previously Tor browser would time out and give an option to capture logs to the clipboard but that no longer happens. The Tor browser just sits with no progress bar information.

November 17, 2017

Permalink

search for bridges outside US. You can set up your own VPN in a virtual GNU/Linux image and run it from an online host service or pay for VPN (using cash cards, crypto currency). Do some homework first. Connect to wireless (not your own) with WIFI dongle, fake MAC and IP, use Tor to connect to the VPN. You are going to need to read up on proxy and SSH tunneling etc. Don't then log into accounts or go acting like a clown.

November 17, 2017

Permalink

is there any way to bypass youtube ip checker because some countries are banned from seeing videos.......

is there any way to proxy all computer connection through tor browser? seems it could happen before but not today? you can use onion buddy but not clear.

November 18, 2017

Permalink

hi there,

I am wondering whether or not the new version tor browser 7.0.10 revoked the CNNIC certificate ?

Thanks!

November 18, 2017

Permalink

Did something change recently with Twitter and the "high" security setting in TorButton? I used to be able to set it to "high" and be able to load my Twitter feed, but now it won't load unless I set it to "medium" first, then load Twitter. Note: this is just with the feeds. I can login on Twitter fine with it set to "high" but feeds won't load.

November 21, 2017

In reply to gk

Permalink

Thank you for this link. That did fix the Twitter issue and I'm glad to know of the YouTube workaround as well!

November 19, 2017

Permalink

I am not using the Tor-Browser for a long time and I am no expert...
I like the Tor project and I want to participate with a relay.
I am supposed to edit the torrc-file, so
I opened the torrc file:
"# This file was generated by Tor; if you edit it, comments will not be preserved
# The old torrc file was renamed to torrc.orig.1 or similar, and Tor will ignore it"

the torrc.orig.1 opens empty with my editor.
What am I doing wrong?

November 19, 2017

Permalink

for some reason all day i have not been able to "Test Tor Network Settings" but i can access other websites other than this "Test Tor Network Settings" page .. seem all fishy to me

November 19, 2017

Permalink

I use some locally hosted client-side javascript web apps, specifically coinb.in and bip32.org. The remotely hosted versions render correctly. But opening the same apps locally with file://, they don't render correctly and are non-functional even with no-script disabled. I'm experiencing this problem with latest TOR browser on Debian stable, Tails 3.3, and Whonix 13.

November 19, 2017

Permalink

Hello again, After launching, I cannot seem to get it to test Tor Network settings. It will only do that after going to some other site first. Prior to 7.0.10, it would always check pre moving on. Any idea what has changed that function? Thank you in advance.

November 20, 2017

Permalink

Hi everybody. No_Script plugin has list of "Untrusted" domains. The question is: whether
or not adding new URLs in this list could change my fingerprinting?

there are a white-list & a https tab not an untrusted domains 'choice'.
it is depending on your threat model :
- if you are not too much exposed and lived in a safe location , it should not change your fingerprint.
- if you wish be safe , do not add a domain or address site in the white-list and add it on the https list.
- as soon as you change the settings -about:config- (bookmarks & white-list included) it could be revealed using sophisticated 'hack' so it is not recommended (fingerprint).

You must set no-script & https & tor settings & cookies & search browser before using Tor Browser according on your wishes.

Hi again. Thanks. I'm appreciating your reply. It seems like I need to clarify the case.

There is "noscript.showUntrusted" option at the "about:config" settings. If you toggle it on there would appear "Untrusted" line at the No_Script dropdown menu. By marking web addresses and domains as "Untrusted" you could compose your own blacklist (for example : Mark torproject.org as Untrusted ; Mark ocewjwkdco.tudasnich.de as Untrusted ; Mark https://ocewjwkdco.tudasnich.de as Untrusted ). That list would be stored at the "about:config" "noscript.untrusted user_set string (whatever you add)" line.
Eventually you could ended up with huge and unique scroll.
My question was about that.

But how could I determine whether my location is safe or not? And what do you mean : "too much exposed"?

"You must set no-script & https & tor settings & cookies & search browser before using Tor
Browser according on your wishes."
Could you suggest such safe settings, please?

November 21, 2017

Permalink

TOR inhibits, terribly much slow !! Long enough, very slow!
Unexpectedly long loads any page, more than ten minutes I can not wait.
What to do??

November 22, 2017

Permalink

I want to get the latest version of Tor expert bundle, but didn't see any download link via Tor official webiste. Where can I find it?

Thanks a lot.

November 23, 2017

In reply to gk

Permalink

Hi there,

Thanks !

I am wondering would it be possile to download Tor expert bundle via a link where I can find all the older builds and its signature? something like this: https://www.virtualbox.org/wiki/Download_Old_Builds_5_0
If this is not possbile, could you provide a link where I can download expert bundle version 0.3.0.10/ 0.3.11 with its signature?

Many thanks in advance.

We have everything archived at https://archive.torproject.org/tor-package-archive/torbrowser/. Unfortunately the expert bundles are buried in the respective Tor Browser releases. For 0.3.0.10 this would be:

https://archive.torproject.org/tor-package-archive/torbrowser/7.0.4/

I assume you meant 0.3.0.11? We did not build that one but rather switched to 0.3.1.7 directly it seems.

November 23, 2017

Permalink

Pulseaudio sound does not work with Tor Browser, but it does with Firefox. Running with --verbose shows error in console:
Failed to create secure directory (/home/someuser/.config/pulse): Permission denied

Stopping pulseaudio and trying to use apulse libs gives error:
[apulse] [error] do_connect_pcm: can't get initial hw parameters for playback device "default". Error code 1 (Operation not permitted)
[apulse] [error] do_connect_pcm: failed to open ALSA device. Apulse does no resampling or format conversion, leaving that task to ALSA plugins. Ensure that selected device is capable of playing a particular sample format at a particular rate. They have to be supported by either hardware directly, or by "plug" and "dmix" ALSA plugins which will perform required conversions on CPU.
Workarounds suggested by apulse have no effect.
And with pulseaudio not running, firefox sound doesn't work either, but other ALSA apps work fine.

November 24, 2017

In reply to gk

Permalink

The current permissions are rwx------ (700) owned by someuser. No effect on changing them to 777.

It must be related to its sandbox, although it refuses to print any sandbox debug messages. How do you whitelist access to pulseaudio or the ALSA device apulse is trying, or work around it?

If you run Debian you should now that devs recompiled their firefox with alsa support, but TBB devs decided to not follow Debian way--they use upstream version of firefox, where alsa support is disabled during compilation.

It is not straightforward to get PulseAudio (PA) runnning on any normal secure system. I think that if not yet, very soon PA will not work on any Linux system without systemd installed (btw, Devuan was forked from Debian just to get good system without systemd and dbus). So, if you follow classic UNIX secure way, soon or later you will loss sound support in TorBrowser forever. Sad, but true.

I had the same problem, so I tried to get PA with SysV working. I didn't get sound working in TBB even with PA running. Anyway, moving to systemd and PA to get sound working is as awful as moving to proprietary closed source software.

November 23, 2017

Permalink

I use few different torbrowsers with slightly different set of preferences (all of them are using the same system tor on my Linux machine). I update them manually by checking PGP signatures in safe evironment. After each new TBB release I need to run each torbrowser in safe and clean environment and change few preferences to get working clean copy (so, I can always rollback to it after any of my torbrowser sessions). I don't need to change too many options, it is just about 5 preferences: proxy server, default search engine, default home page (blank), disable autoapdate, adjusting security slider... However, it takes too much time to create new clean torbrowsers, so I decided to write my own script for this work.

As I understood from google, the most reliable way to make changes to firefox/torbrowser preferences is to create new user.js file on the same profile directory as prefs.js file (Am I right?). The next thing I need is to figure out what are the options I need to add to user.js which will make the same effect as manual editing of preferences in torbrowser interface.

After first start of torbrowser the file prefs.js is created. At the second start I can make some changes to preferences and see what is changed in prefs.js. This way worked well for many options, but not for all of them. It looks like firefox stores in prefs.js a lot of stuff including very minor things such as "when particular preferences were applied," "which things were already clicked in interface," etc. For me, exact set of options in prefs.js is not well predictable. I also understand that in some future the names of preferences and behavior of torbrowser may change, so I need to track it.

My particular questions in relation to this script:

1). Disabling tor-launcher through variables "TOR_SKIP_LAUNCH=1 TOR_SKIP_CONTROLPORTTEST=1 ./start-tor-browser" works well, but I would like to disable this addon completely (as in preferences of torbrowser). Is there any way to do it in script before starting TBB? Well, there is option:

user_pref("extensions.enabledAddons", "torbutton%40torproject.org:1.9.7.10,%7B972ce4c6-7e08-4474-a285-3208198ce6fd%7D:52.5.0");

However, in order to to use it, as I see, at each update I need to manually write versions of torbutton and other extensions. Can it be done simpler?

2). I need to change my default search engine from DuckDuckGo to DuckDuckGoOnion. How can I do that? It is realted either to file search.json.mozlz4 or very long and hard to parse line in prefs.js (which deals with the HTTPS Everywhere, probably). I didn't find any way to solve this problem.

3). Since I update TBB manually, I disable the following update options:

user_pref("app.update.enabled", false);
user_pref("app.update.auto", false);
user_pref("app.update.backgroundErrors", 1);

Is it correct? I mean, is it the same as choosing "never check for updates" in "prefereces - advanced - update"?

4). By comparing changes done from interface and from command line I noticed that in the first case prefs.js includes also these lines:

user_pref("extensions.ui.dictionary.hidden", true);
user_pref("extensions.ui.experiment.hidden", true);
user_pref("extensions.ui.locale.hidden", true);

and

user_pref("gfx.blacklist.canvas2d.acceleration", 4);
user_pref("gfx.blacklist.canvas2d.acceleration.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.direct2d", 4);
user_pref("gfx.blacklist.direct2d.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.direct3d11angle", 4);
user_pref("gfx.blacklist.direct3d11angle.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.hardwarevideodecoding", 4);
user_pref("gfx.blacklist.hardwarevideodecoding.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.layers.direct3d10", 4);
user_pref("gfx.blacklist.layers.direct3d10-1", 4);
user_pref("gfx.blacklist.layers.direct3d10-1.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.layers.direct3d10.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.layers.direct3d11", 4);
user_pref("gfx.blacklist.layers.direct3d11.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.layers.direct3d9", 4);
user_pref("gfx.blacklist.layers.direct3d9.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.layers.opengl", 4);
user_pref("gfx.blacklist.layers.opengl.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.stagefright", 4);
user_pref("gfx.blacklist.stagefright.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webgl.angle", 4);
user_pref("gfx.blacklist.webgl.angle.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webgl.angle", 4);
user_pref("gfx.blacklist.webgl.angle.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webgl.msaa", 4);
user_pref("gfx.blacklist.webgl.msaa.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webgl.opengl", 4);
user_pref("gfx.blacklist.webgl.opengl.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webrtc.hw.acceleration", 4);
user_pref("gfx.blacklist.webrtc.hw.acceleration.decode", 4);
user_pref("gfx.blacklist.webrtc.hw.acceleration.decode.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webrtc.hw.acceleration.encode", 4);
user_pref("gfx.blacklist.webrtc.hw.acceleration.encode.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.blacklist.webrtc.hw.acceleration.failureid", "FEATURE_FAILURE_OPENGL_1");
user_pref("gfx.font_rendering.opentype_svg.enabled", false);

I don't understand the origin of this options, because clean torbrowser doesn't add them in prefs.js after the first start, but they are added if I do my changes through torbrowser interface (but not added, if I do it using commandline). So, should I add these options to my user.js too? Are they essential?

November 25, 2017

Permalink

I have core file for this version of firefox. I think that after visiting one page with JS, scripts killed browser before it could ask user to stop scripts. I visited the same links again but crash didn't happen. What can I do with this core? It is about 0.5GB big (non-compressed). Which backtrace are you interested in? How can I send it to you? Tell me which commands to type in gdb (Linux, 64bit).

November 28, 2017

In reply to gk

Permalink

Yes, I used that wiki to get core file. Your link tells me vague thing:

You can then use the usual gdb commands (backtrace, print, up, down, etc) to inspect the stack, variables, and program state at the time of the crash.

I am not familiar with the debugging and firefox internals, I don't know what is meant exactly by "stack trace" which is wanted. Google tells me it can be either of commands:

(gdb) bt
(gdb) bt full
(gdb) info threads
(gdb) thread apply all bt
(gdb) thread apply all bt full

When I run gdb ./firefox /path/to/core I get:

GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
...
Reading symbols from ./firefox...Reading symbols from /path/to/tor-browser_en-US/Browser/.debug/firefox...done.
done.

warning: core file may not match specified executable file.
[New LWP 1620]
[New LWP 1631]
[New LWP 1652]
[New LWP 1642]
[New LWP 1648]
[New LWP 1623]
[New LWP 1624]
[New LWP 1625]
[New LWP 1626]
[New LWP 1627]
[New LWP 1628]
[New LWP 1630]
[New LWP 1634]
[New LWP 1640]
[New LWP 1641]
[New LWP 1643]
[New LWP 1649]
[New LWP 1688]
[New LWP 2483]
[New LWP 1616]
[New LWP 1633]
[New LWP 1632]
[New LWP 1629]
Core was generated by `/path/to/tor-browser_en-US/Browser/plugin-container -greom'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x0000555555559225 in ?? ()
(gdb) bt full
#0 0x0000555555559225 in ?? ()
No symbol table info available.
#1 0x0000000000000003 in ?? ()
No symbol table info available.
#2 0x00007ffff3c9ba86 in ?? ()
No symbol table info available.
#3 0x0000000000000000 in ?? ()
No symbol table info available.
(gdb) bt
#0 0x0000555555559225 in ?? ()
#1 0x0000000000000003 in ?? ()
#2 0x00007ffff3c9ba86 in ?? ()
#3 0x0000000000000000 in ?? ()
(gdb)

I guess that the error is in some firefox subsystem which I have no "symbol tables" for, i.e. my core file is mostly useless. Anyway, compressed core file is about 40 MB long, I can upload it somewhere for you. Do you want it?

November 29, 2017

In reply to gk

Permalink

I got some new crash. When I am in original session yet, if I print bt or bt full, it gives meaningful trace. I thought I can always reprint it again by exiting and later running gdb /path/to/firefox /path/to/core again with bt command, but... it seems it is not so! Output after restart of gdb is completely different. Can I get original meaningful stacktrace? I am not experienced with debugging or gdb.

December 04, 2017

In reply to gk

Permalink

The screen comes up with some URls then I clcik on noscript to temporary allow and then goes blank on a Torbrowser running on a Mac OSx. running through TOR relay Nickname
xorox
OR Addresses
37.187.94.86:443

I see. I assume you are using the security slider set to "High" and are allowing scripts if needed on particular sites, right? The problem in your case is that the mode "High" is blocking more than just scripts and it is sometimes not enough to just enable them. In this case you would need to allow SVG content as well to get the page rendered which is forbidden on the highest security level. To test whether that really makes a difference for you open about:config and set svg.in-content.enabled to true.

Hm, I still don't understand your problem. Are you saying you don't have this drop down menu? Or just clicking on it does not work?

How can I reproduce your problem? What operating system are you using? Did you adjust your security slider to a higher level? If so, which one? What Tor Browser version are you using?

December 08, 2017

In reply to gk

Permalink

The drop down menu doesn't appear. Clicking on it loads a web page instead of opening a drop down menu.
The operating system is Windows
The Tor Button Security Settings says "Your custom browser preferences have resulted in unusual security settings. For security and privacy reasons, we recommend you choose one of the default security levels." There's no slider.
The Tor Browser version is 7.0.10

December 12, 2017

In reply to gk

Permalink

Reset the settings and tested with slider on lowest level has same result.

November 29, 2017

Permalink

Printing to PDF on Linux does not work, it goes through the motions but no file is written.

December 01, 2017

In reply to gk

Permalink

Ok but there are releasenotes for FF57.0.1 with "Various security fixes" only.
No releasenotes, no Various security fixes for 52.5.1. May later?

There are no advisories for 57.0.1 because 52.5.1esr never made it to the release channel. There will be a 57.0.2 and a 52.5.2esr out there shortly with the usual advisories detailing more than just "Various security fixes".

December 01, 2017

Permalink

Hmmmmm

December 01, 2017

Permalink

Canada's Brampton wireless is blocking Tor while I was using public IP 192.82.150.249 on a Mac. I have it set to use ports 80 and 443 and I tried All transport types, OBFS4 ,OBF3,meek-azure and meek-amazon. And I still can not connect. Below is the log showing connection problem.

30-11-2017, 19:01:07.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30-11-2017, 19:01:07.100 [NOTICE] Opening Socks listener on 127.0.0.1:9150
30-11-2017, 19:01:07.100 [NOTICE] Bootstrapped 80%: Connecting to the Tor network
30-11-2017, 19:01:07.100 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop
30-11-2017, 19:01:07.100 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '154.35.22.9:12166' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '154.35.22.12:4304' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '37.218.245.14:38224' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '37.218.240.34:40035' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '109.105.109.165:10527' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '154.35.22.13:16815' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '154.35.22.11:16488' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '109.105.109.147:13764' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '154.35.22.10:15937' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [NOTICE] Bridge at '83.212.101.3:50002' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:01:08.300 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:01:08.300 [WARN] Could not make a one-hop connection to $00DC6C4FA49A65BD1472993CF6730D54F11E0DBB. Discarding this circuit.
30-11-2017, 19:01:08.300 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:01:08.300 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:01:08.300 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:01:08.300 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:01:08.300 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:01:08.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:01:09.000 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:01:09.000 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:01:09.100 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:01:45.500 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:02:06.600 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:02:06.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:02:08.200 [WARN] Proxy Client: unable to connect to 154.35.22.9:443 ("general SOCKS server failure")
30-11-2017, 19:02:08.200 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:02:08.200 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
30-11-2017, 19:02:09.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:09.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:10.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:10.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:11.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:11.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:23.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:02:39.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:39.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:40.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:40.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:41.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:41.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:42.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:42.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:43.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:43.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:02:44.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:02:44.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:05.300 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:03:06.900 [NOTICE] Ignoring directory request, since no bridge nodes are available yet.
30-11-2017, 19:03:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:03:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:03:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:03:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:03:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:03:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:03:08.000 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:03:08.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:03:10.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:10.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:11.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:11.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:11.900 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:03:11.900 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:03:12.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:12.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:12.900 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:03:12.900 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:03:13.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:13.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:41.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:41.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:42.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:42.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:43.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:43.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:44.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:44.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:45.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:45.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:03:46.900 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:03:46.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:04:06.900 [WARN] Cannot make an outgoing begindir connection without a remote ORPort.
30-11-2017, 19:04:10.100 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:04:11.900 [WARN] Proxy Client: unable to connect to 154.35.22.9:443 ("general SOCKS server failure")
30-11-2017, 19:04:12.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:04:13.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:05:14.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:06:06.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:06:16.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:06:17.000 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:06:17.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:06:20.700 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:06:20.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:06:22.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:06:59.400 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:07:08.600 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:07:18.800 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:07:47.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:07:49.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:07:51.400 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:07:51.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:07:52.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:07:53.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:07:54.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:08:08.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:08:48.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:08:51.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:08:52.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:08:53.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:08:55.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:08:57.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:09:01.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:09:34.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:09:50.000 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:09:54.600 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:10:50.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:10:54.600 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:10:55.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:10:56.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:10:57.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:10:58.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:11:07.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:11:09.100 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:11:54.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:12:00.600 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:12:01.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:12:03.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:12:05.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:12:42.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:12:55.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:13:00.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:13:01.100 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:14:01.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:14:03.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:14:05.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:14:07.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:14:08.200 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:14:08.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:14:09.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:14:10.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:15:04.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:15:11.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:15:13.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:15:14.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:15:16.200 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:15:17.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:15:19.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:15:56.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:16:13.000 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:16:15.100 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:17:07.000 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:17:08.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:17:09.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:17:10.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:17:11.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:17:12.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:17:13.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:17:13.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:18:07.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:18:09.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:18:10.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:18:11.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:18:13.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:18:14.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:18:15.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:18:52.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:19:08.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:19:11.200 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:19:12.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:19:13.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:19:13.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:19:14.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:19:15.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:19:16.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:20:10.600 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:20:42.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:20:44.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:20:45.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:20:46.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:20:48.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:20:50.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:21:07.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '154.35.22.9:12166' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '154.35.22.12:4304' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '37.218.245.14:38224' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '37.218.240.34:40035' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '109.105.109.165:10527' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '154.35.22.13:16815' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '154.35.22.11:16488' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '109.105.109.147:13764' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '154.35.22.10:15937' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [NOTICE] Bridge at '83.212.101.3:50002' isn't reachable by our firewall policy. Asking bridge authority instead.
30-11-2017, 19:21:08.000 [WARN] Could not choose valid address for JonbesheSabz
30-11-2017, 19:21:08.000 [WARN] Could not make a one-hop connection to $00DC6C4FA49A65BD1472993CF6730D54F11E0DBB. Discarding this circuit.
30-11-2017, 19:21:08.000 [NOTICE] We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits pending. Waiting until some finish.
30-11-2017, 19:21:08.000 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:21:08.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:21:08.000 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:21:08.000 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:21:08.000 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:21:27.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:21:44.100 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:21:46.100 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:22:05.100 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:22:08.000 [WARN] Proxy Client: unable to connect to 154.35.22.9:443 ("general SOCKS server failure")
30-11-2017, 19:22:08.000 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
30-11-2017, 19:22:18.600 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:22:19.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:22:20.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:22:45.000 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:23:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:23:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:23:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:23:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:23:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:23:07.900 [NOTICE] Tried to fetch a descriptor directly from a bridge, but that bridge is not reachable through our firewall.
30-11-2017, 19:23:07.900 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:23:07.900 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:23:08.900 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
30-11-2017, 19:23:08.900 [WARN] Proxy Client: unable to connect to 154.35.22.9:443 ("general SOCKS server failure")
30-11-2017, 19:23:09.000 [WARN] Proxy Client: unable to connect to 154.35.22.10:80 ("general SOCKS server failure")
30-11-2017, 19:23:09.000 [WARN] Proxy Client: unable to connect to 154.35.22.11:80 ("general SOCKS server failure")
30-11-2017, 19:23:18.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:23:21.400 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:23:22.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:23:23.000 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:23:46.000 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:23:51.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:23:53.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:24:06.000 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:24:10.000 [WARN] Proxy Client: unable to connect to 154.35.22.9:443 ("general SOCKS server failure")
30-11-2017, 19:24:19.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:24:30.100 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:24:54.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:24:56.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:24:58.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:24:58.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:24:59.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:25:00.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:25:01.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:25:05.100 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:25:55.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:26:56.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:26:58.800 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:26:59.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:27:00.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:27:01.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:27:03.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:27:05.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:27:42.100 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:27:58.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:28:01.000 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:28:06.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:28:08.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:28:09.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:28:10.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:28:11.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:28:12.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:28:13.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:29:07.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:30:08.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:30:09.900 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:30:11.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:30:13.000 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:30:13.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:30:15.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:30:17.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:30:54.300 [WARN] Proxy Client: unable to connect to 85.17.30.79:443 ("general SOCKS server failure")
30-11-2017, 19:31:11.000 [WARN] Proxy Client: unable to connect to 85.31.186.26:443 ("general SOCKS server failure")
30-11-2017, 19:31:13.200 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
30-11-2017, 19:31:18.900 [WARN] Proxy Client: unable to connect to 85.31.186.98:443 ("general SOCKS server failure")
30-11-2017, 19:31:20.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:31:21.900 [WARN] Proxy Client: unable to connect to 38.229.1.78:80 ("general SOCKS server failure")
30-11-2017, 19:31:22.900 [WARN] Proxy Client: unable to connect to 38.229.33.83:80 ("general SOCKS server failure")
30-11-2017, 19:31:23.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:31:24.900 [WARN] Proxy Client: unable to connect to 2001:470:b381:bfff:216:3eff:fe23:d6c3:443 ("general SOCKS server failure")
30-11-2017, 19:31:25.900 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
30-11-2017, 19:31:47.400 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
30-11-2017, 19:31:47.400 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30-11-2017, 19:31:47.400 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
30-11-2017, 19:31:47.900 [NOTICE] Delaying directory fetches: DisableNetwork is set.

December 01, 2017

Permalink

is there a reason for delaying 7.0.11 release?
TBB 7.0.11 from /~gk/builds is running fine.

Yes, there are actually two.

1) We wanted to pick up the new Tor security update.
2) We need to pick up a new Firefox (52.5.2esr) as one of the patches included in 52.5.1esr (which we picked up in the build you mention) seems to be not ready for release yet. It's causing test failures which still need to get investigated.

That said we hope to have new Tor Browser releases out tomorrow (we already built the new alpha and are currently signing it).

December 02, 2017

Permalink

TBB is again crashing at google maps (almost immediately, almost reproducible). Is it something knew and known? Is it regression within the ticket 16771? If it is know, I'll send you my backtrace.

December 02, 2017

Permalink

Please explain:
1) how to remember passwords in TOR;
2) how to start TOR with previous tabs.

Thanks.

December 02, 2017

Permalink

I find it wired that firefox reproducibly crashes on some web pages if and only if it is run in debugger. What does it mean?

Yes. The layout of the FTE files is not compatible with macOS' code signing requirement. We have https://trac.torproject.org/projects/tor/ticket/18495 for fixing that. There are no Scramblesuit default bridges anymore as the one we had sipped could not keep up with the load, see: https://trac.torproject.org/projects/tor/ticket/21536.

That said you should be able to run Scramblesuit bridges in Tor Browser nevertheless.

December 03, 2017

Permalink

Why comments to recent tor blog news, e.g. "New stable Tor releases, with security fixes" are disabled here?

December 05, 2017

Permalink

Got the problem with this tor version (0.3.1.9):

Dec 06 02:03:03.000 [notice] Heartbeat: Tor's uptime is XX:XX hours, with XX circuits open. I've sent XX.XX MB and received XX.XX GB.
Dec 06 02:03:03.000 [notice] Average packaged cell fullness: 65.XXX%. TLS write overhead: 4%
Dec 06 02:03:03.000 [notice] Diagnostic for issue 8387: Found 1 one-hop circuits more than 1800 seconds old! Logging 1...
Dec 06 02:03:03.000 [notice] #0 created at 2017-12-06 01:10:06. open, General-purpose client. Not marked for close. Package window: 1000. usable for new conns. Dirty since 2017-12-06 01:56:04 (4XX seconds vs 600-second cutoff).
Dec 06 02:03:03.000 [notice] It has been 2 seconds since I last called circuit_expire_old_circuits_clientside().

Added my comment to ticket 8387.

December 06, 2017

Permalink

I'm unable to view most California-based news organizations, including LA Times, and KTLA, as well as some Europeans ones, including BBC, using TOR.
Only https://ixquick-proxy.com/ works from Startpage.
Anyone experiencing similar issues?

December 08, 2017

Permalink

Hi. Just before there's an avalanche of YouTube related questions: YouTube did a thing again. In order to use their site, Tor users would have to set their security setting to middle (temporarily).
This might not at all be the smartest or most secure way to do it, but it is a way.
Hope this will help someone and have a nice day.

December 09, 2017

Permalink

Hello , Every time I attempt a new Tor circuit, the initial hookup stays the same: from me to C.R. (31.31.73.222), etc. WTF? This has remained like this for the most part, for three days. It feels wrong. Is it anything?

January 10, 2018

Permalink

If the internet connection goes down while connecting, you enter a world of bing noises and message boxes where you are told that the connection can't be established, and there is no quit option, just an ok button which tries again and fails. Again and again forever. Even though you've fixed the problem and reconnected.

Maybe someone would like to look into the possibility of: If Internet = OK, connect; if No Internet, stop the fucking endless loop and trigger Task Manager allowing a nasty forced termination. Or just self-destruct with a please restart the program message.

Thank you otherwise for a near-flawless program.