Hi Folks.
 
I am running an OBFS4 Bridge at home for a while now.
But everytime im looking in the logs it says
# [notice] Bootstrapped 0%: Starting
but never went up or showing another entry. Port 9002 is opened in NAT/Firewall
 
Will appreciate any useful input :)
 
 
Log notice file /var/log/tor/notices.log
#Bridge config
RunAsDaemon 1
#DataDirectory /var/lib/tor
ControlPort 9051
HashedControlPassword xxx
CookieAuthentication 1
ORPort 9002
BridgeRelay 1
Nickname volkerhome
ContactInfo volkern <volker.mink AT protonmail dot ch>
ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
ExtORPort auto
 
 
LOG:
Oct 07 16:54:11.429 [notice] Tor 0.2.9.16 (git-9ef571339967c1e5) running on Linux with Libevent 2.0.21-stable, OpenSSL 1.1.0k and Zlib 1.2.8.
Oct 07 16:54:11.435 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Oct 07 16:54:11.435 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Oct 07 16:54:11.436 [notice] Read configuration file "/etc/tor/torrc".
Oct 07 16:54:11.544 [notice] Based on detected system memory, MaxMemInQueues is set to 324 MB. You can override this by setting MaxMemInQueues by hand.
Oct 07 16:54:11.577 [notice] Opening Socks listener on 127.0.0.1:9050
Oct 07 16:54:11.582 [notice] Opening Control listener on 127.0.0.1:9051
Oct 07 16:54:11.582 [notice] Opening OR listener on 0.0.0.0:9002
Oct 07 16:54:11.582 [notice] Opening Extended OR listener on 127.0.0.1:0
Oct 07 16:54:11.582 [notice] Extended OR listener listening on port 40215.
Oct 07 16:54:11.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Oct 07 16:54:20.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Oct 07 16:54:23.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Oct 07 16:54:32.000 [notice] Your Tor server's identity key fingerprint is 'volkerhome 9980C4A77740F07A36277697A40407B5AAC4DA6C'
Oct 07 16:54:33.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'volkerhome AA8CE170582A74A6F69EFE06E3AC717533B6C781'
Oct 07 16:54:33.000 [notice] Bootstrapped 0%: Starting