Greetings everyone!
We've very recently merged upstream (tor.git) full IPv6 supports which implies many many things. We are still finalizing the work but most of it is in at the moment.
This is a call for help if anyone would like to test either git master[1] or nightly builds[2] (only Debian) to test for us a specific feature.
The feature we would love for some of you to test is the IPv6 address discovery. In short, with this new feature, specifying an ORPort without an address will automatically bind tor to [::]:<port> and attempt to find the IPv6 address by looking at (in this order):
1. "Address" from torrc 2. "ORPort address:port" from torrc 3. Interface address. First public IPv6 is used. 4. Local hostname, DNS AAAA query.
If all fails, the relay will simply never publish an IPv6 in the descriptor but it will work properly with the IPv4 (still mandatory).
The other new thing is that now tor supports *two* "Address" statement which can be a hostname or IPv4 or IPv6 now.
Thus this is now valid:
Address 1.2.3.4 Address [4242::4242] ORPort 9001
Your Tor will bind to 0.0.0.0:9001 and [::]:9001 but will publish the 1.2.3.4 for the IPv4 address and [4242::4242] for IPv6 in the descriptor that is the address to use to reach your relay's ORPort.
Now, if you happen to have this configuration which I believe might be common at the moment:
ORPort 9001 ORPort [4242::4242]:9001
The second ORPort which specifies an IPv6 address will supersede the "ORPort 9001" which uses [::] and thus you will bind on 0.0.0.0:9001 and [4242::4242]:9001. You should get a notice log about this.
Thus the recommended configuration to avoid that log notice would be to bind to specific addresses per family:
ORPort <IPv4>:9001 ORPort <IPv6>:9001
And of course, if you want your relay to _not_ listen on IPv6:
ORPort 9001 IPv4Only
In your notice log, you will see which address is used to bind on the ORPort and then you will see the reachability test succeed or not on the address that tor either used from the configuration or auto discovered that is the address you are supposedly reachable from.
Man page has NOT been updated yet, it will arrive once we stabilize the IPv6 feature and everything around it.
Please, do report (on this thread) _anything_ even slightly annoying about this like logging or lack of logging and so on. This is a complex feature and errors can be made thus any testing you can offer is extremely appreciated.
Thanks!! David
[1] https://gitweb.torproject.org/tor.git/ [2] https://2019.www.torproject.org/docs/debian.html.en
Great news. Well done
We need to be rid of the mandated IPv4 OR port for some situations. There are now many of us fibre users with 1GB upload and download speeds who have a reachable range if IPv6 addresses, and we could offer relays and bridges on a single or pair of IPV6 address with a pinhole. Cannot do so at the moment as the mandatory IPv4 OR address is dynamic or not reachable as behind CGNAT.
Gerry
-----Original Message----- From: tor-relays tor-relays-bounces@lists.torproject.org On Behalf Of David Goulet Sent: 22 July 2020 20:55 To: tor-relays@lists.torproject.org Subject: [tor-relays] Call for Testing - New Feature: Relay IPv6 Address Discovery
Greetings everyone!
We've very recently merged upstream (tor.git) full IPv6 supports which implies many many things. We are still finalizing the work but most of it is in at the moment.
This is a call for help if anyone would like to test either git master[1] or nightly builds[2] (only Debian) to test for us a specific feature.
The feature we would love for some of you to test is the IPv6 address discovery. In short, with this new feature, specifying an ORPort without an address will automatically bind tor to [::]:<port> and attempt to find the IPv6 address by looking at (in this order):
1. "Address" from torrc 2. "ORPort address:port" from torrc 3. Interface address. First public IPv6 is used. 4. Local hostname, DNS AAAA query.
If all fails, the relay will simply never publish an IPv6 in the descriptor but it will work properly with the IPv4 (still mandatory).
The other new thing is that now tor supports *two* "Address" statement which can be a hostname or IPv4 or IPv6 now.
Thus this is now valid:
Address 1.2.3.4 Address [4242::4242] ORPort 9001
Your Tor will bind to 0.0.0.0:9001 and [::]:9001 but will publish the 1.2.3.4 for the IPv4 address and [4242::4242] for IPv6 in the descriptor that is the address to use to reach your relay's ORPort.
Now, if you happen to have this configuration which I believe might be common at the moment:
ORPort 9001 ORPort [4242::4242]:9001
The second ORPort which specifies an IPv6 address will supersede the "ORPort 9001" which uses [::] and thus you will bind on 0.0.0.0:9001 and [4242::4242]:9001. You should get a notice log about this.
Thus the recommended configuration to avoid that log notice would be to bind to specific addresses per family:
ORPort <IPv4>:9001 ORPort <IPv6>:9001
And of course, if you want your relay to _not_ listen on IPv6:
ORPort 9001 IPv4Only
In your notice log, you will see which address is used to bind on the ORPort and then you will see the reachability test succeed or not on the address that tor either used from the configuration or auto discovered that is the address you are supposedly reachable from.
Man page has NOT been updated yet, it will arrive once we stabilize the IPv6 feature and everything around it.
Please, do report (on this thread) _anything_ even slightly annoying about this like logging or lack of logging and so on. This is a complex feature and errors can be made thus any testing you can offer is extremely appreciated.
Thanks!! David
[1] https://gitweb.torproject.org/tor.git/ [2] https://2019.www.torproject.org/docs/debian.html.en
-- EeJVrrC/dHQXEXYB1ShOOZ4QuQ8PMnRY2XGq4BYsFq4=
Where do we get daily builds?
-----Original Message----- From: tor-relays tor-relays-bounces@lists.torproject.org On Behalf Of David Goulet Sent: 22 July 2020 20:55 To: tor-relays@lists.torproject.org Subject: [tor-relays] Call for Testing - New Feature: Relay IPv6 Address Discovery
Greetings everyone!
We've very recently merged upstream (tor.git) full IPv6 supports which implies many many things. We are still finalizing the work but most of it is in at the moment.
This is a call for help if anyone would like to test either git master[1] or nightly builds[2] (only Debian) to test for us a specific feature.
The feature we would love for some of you to test is the IPv6 address discovery. In short, with this new feature, specifying an ORPort without an address will automatically bind tor to [::]:<port> and attempt to find the IPv6 address by looking at (in this order):
1. "Address" from torrc 2. "ORPort address:port" from torrc 3. Interface address. First public IPv6 is used. 4. Local hostname, DNS AAAA query.
If all fails, the relay will simply never publish an IPv6 in the descriptor but it will work properly with the IPv4 (still mandatory).
The other new thing is that now tor supports *two* "Address" statement which can be a hostname or IPv4 or IPv6 now.
Thus this is now valid:
Address 1.2.3.4 Address [4242::4242] ORPort 9001
Your Tor will bind to 0.0.0.0:9001 and [::]:9001 but will publish the 1.2.3.4 for the IPv4 address and [4242::4242] for IPv6 in the descriptor that is the address to use to reach your relay's ORPort.
Now, if you happen to have this configuration which I believe might be common at the moment:
ORPort 9001 ORPort [4242::4242]:9001
The second ORPort which specifies an IPv6 address will supersede the "ORPort 9001" which uses [::] and thus you will bind on 0.0.0.0:9001 and [4242::4242]:9001. You should get a notice log about this.
Thus the recommended configuration to avoid that log notice would be to bind to specific addresses per family:
ORPort <IPv4>:9001 ORPort <IPv6>:9001
And of course, if you want your relay to _not_ listen on IPv6:
ORPort 9001 IPv4Only
In your notice log, you will see which address is used to bind on the ORPort and then you will see the reachability test succeed or not on the address that tor either used from the configuration or auto discovered that is the address you are supposedly reachable from.
Man page has NOT been updated yet, it will arrive once we stabilize the IPv6 feature and everything around it.
Please, do report (on this thread) _anything_ even slightly annoying about this like logging or lack of logging and so on. This is a complex feature and errors can be made thus any testing you can offer is extremely appreciated.
Thanks!! David
[1] https://gitweb.torproject.org/tor.git/ [2] https://2019.www.torproject.org/docs/debian.html.en
-- EeJVrrC/dHQXEXYB1ShOOZ4QuQ8PMnRY2XGq4BYsFq4=
hi Gerard,
you can find the instructions via the link provided in the original email:
[2] https://2019.www.torproject.org/docs/debian.html.en
gr. Paul
On Thu, Jul 23, 2020 at 11:48 PM Dr Gerard Bulger gerard@bulger.co.uk wrote:
Where do we get daily builds?
-----Original Message----- From: tor-relays tor-relays-bounces@lists.torproject.org On Behalf Of David Goulet Sent: 22 July 2020 20:55 To: tor-relays@lists.torproject.org Subject: [tor-relays] Call for Testing - New Feature: Relay IPv6 Address Discovery
Greetings everyone!
We've very recently merged upstream (tor.git) full IPv6 supports which implies many many things. We are still finalizing the work but most of it is in at the moment.
This is a call for help if anyone would like to test either git master[1] or nightly builds[2] (only Debian) to test for us a specific feature.
The feature we would love for some of you to test is the IPv6 address discovery. In short, with this new feature, specifying an ORPort without an address will automatically bind tor to [::]:<port> and attempt to find the IPv6 address by looking at (in this order):
- "Address" from torrc
- "ORPort address:port" from torrc
- Interface address. First public IPv6 is used.
- Local hostname, DNS AAAA query.
If all fails, the relay will simply never publish an IPv6 in the descriptor but it will work properly with the IPv4 (still mandatory).
The other new thing is that now tor supports *two* "Address" statement which can be a hostname or IPv4 or IPv6 now.
Thus this is now valid:
Address 1.2.3.4 Address [4242::4242] ORPort 9001
Your Tor will bind to 0.0.0.0:9001 and [::]:9001 but will publish the 1.2.3.4 for the IPv4 address and [4242::4242] for IPv6 in the descriptor that is the address to use to reach your relay's ORPort.
Now, if you happen to have this configuration which I believe might be common at the moment:
ORPort 9001 ORPort [4242::4242]:9001
The second ORPort which specifies an IPv6 address will supersede the "ORPort 9001" which uses [::] and thus you will bind on 0.0.0.0:9001 and [4242::4242]:9001. You should get a notice log about this.
Thus the recommended configuration to avoid that log notice would be to bind to specific addresses per family:
ORPort <IPv4>:9001 ORPort <IPv6>:9001
And of course, if you want your relay to _not_ listen on IPv6:
ORPort 9001 IPv4Only
In your notice log, you will see which address is used to bind on the ORPort and then you will see the reachability test succeed or not on the address that tor either used from the configuration or auto discovered that is the address you are supposedly reachable from.
Man page has NOT been updated yet, it will arrive once we stabilize the IPv6 feature and everything around it.
Please, do report (on this thread) _anything_ even slightly annoying about this like logging or lack of logging and so on. This is a complex feature and errors can be made thus any testing you can offer is extremely appreciated.
Thanks!! David
[1] https://gitweb.torproject.org/tor.git/ [2] https://2019.www.torproject.org/docs/debian.html.en
-- EeJVrrC/dHQXEXYB1ShOOZ4QuQ8PMnRY2XGq4BYsFq4=
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Dr Gerard Bulger:
Where do we get daily builds?
See the nightly repos here (debian based only): https://deb.torproject.org/torproject.org/dists/
On 22 Jul (15:54:54), David Goulet wrote:
Greetings everyone!
We've very recently merged upstream (tor.git) full IPv6 supports which implies many many things. We are still finalizing the work but most of it is in at the moment.
Greetings everyone!
Thanks everyone that is helping testing this!
If you are still running a 0.4.5.0-alpha version (or git master), we would like to ask you one more thing. If you could flip this torrc option to 1 so we can help our metrics team build proper graphs to learn how much IPv6 connections we have in the network.
ConnDirectionStatistics 1
Big thanks everyone! David
On 8/26/20 5:46 PM, Toralf Förster wrote:
On 8/26/20 4:56 PM, David Goulet wrote:
If you are still running a 0.4.5.0-alpha version
Not tagged yet, or ?
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Or better asked, why it has a "tor-tor" prefix - this breaks any easy install method/quirk here under Gentoo :-( :#
$ tar -tvf /var/cache/distfiles/tor-0.4.5.0-alpha-dev.tar.gz | head drwxrwxr-x root/root 0 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/ -rw-rw-r-- root/root 6536 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.appveyor.yml -rw-rw-r-- root/root 3926 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.clang-format -rw-rw-r-- root/root 787 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.editorconfig -rw-rw-r-- root/root 3569 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.gitignore -rw-rw-r-- root/root 422 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.gitlab-ci.yml -rw-rw-r-- root/root 104 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.gitmodules -rw-rw-r-- root/root 13591 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/.travis.yml -rw-rw-r-- root/root 282 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/CODE_OF_CONDUCT -rw-rw-r-- root/root 1187 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev/CONTRIBUTING ...
On 8/26/20 7:00 PM, Toralf Förster wrote:
Or better asked, why it has a "tor-tor" prefix - this breaks any easy install method/quirk here under Gentoo :-( :#
$ tar -tvf /var/cache/distfiles/tor-0.4.5.0-alpha-dev.tar.gz | head drwxrwxr-x root/root 0 2020-06-09 20:14 tor-tor-0.4.5.0-alpha-dev
And last, but not least the 4.5.0-alpha-dev tar ball lacks a configure script ...
On 7/22/20 9:54 PM, David Goulet wrote:
In your notice log, you will see which address is used to bind on the ORPort
Not here (hardened stable Gentoo), this is from the notice log:
Aug 26 20:59:18.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now. Aug 26 20:59:19.000 [notice] Delaying directory fetches: We are hibernating or shutting down. Aug 26 20:59:48.000 [notice] Clean shutdown finished. Exiting. Aug 26 20:59:49.000 [notice] Tor 0.4.5.0-alpha-dev opening log file. Aug 26 20:59:50.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Aug 26 20:59:50.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Aug 26 20:59:54.000 [notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster. Aug 26 20:59:54.000 [notice] Your Tor server's identity key fingerprint is 'zwiebeltoralf 63BF46A63F9C21FD315CD061B3EAA3EB05283A0A' Aug 26 20:59:54.000 [notice] Bootstrapped 0% (starting): Starting Aug 26 20:59:54.000 [notice] This version of Tor (0.4.5.0-alpha-dev) is newer than any recommended version, according to the directory authorities. Recommended versions are: 0.3.5.10,0.3.5.11,0.4.2.7,0.4.2.8,0.4.3.3-alpha,0.4.3.4-rc,0.4.3.5,0.4.3.6,0.4.4.1-alpha,0.4.4.2-alpha,0.4.4.3-alpha,0.4.4.4-rc Aug 26 21:00:13.000 [notice] Starting with guard context "default" Aug 26 21:00:13.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Aug 26 21:00:14.000 [notice] Bootstrapped 5% (conn): Connecting to a relay Aug 26 21:00:14.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay Aug 26 21:00:14.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay Aug 26 21:00:14.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done Aug 26 21:00:14.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits Aug 26 21:00:14.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits Aug 26 21:00:14.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit Aug 26 21:00:15.000 [notice] Bootstrapped 100% (done): Done Aug 26 21:00:16.000 [notice] Self-testing indicates your DirPort is reachable from the outside. Excellent. Publishing server descriptor. Aug 26 21:01:15.000 [notice] Performing bandwidth self-test...done. Aug 26 21:02:21.000 [notice] New control connection opened from 127.0.0.1.
and this the config:
# torrc # PIDFile /var/run/tor/tor.pid DataDirectory /var/lib/tor/data
Nickname zwiebeltoralf Address 5.9.158.75 OutboundBindAddress 5.9.158.75 OutboundBindAddress [2a01:4f8:190:514a::2] DirPort 5.9.158.75:80 ORPort 5.9.158.75:443 DirPort [2a01:4f8:190:514a::2]:80 NoAdvertise ORPort [2a01:4f8:190:514a::2]:443
ControlPort 9051
Log notice file /var/log/tor/notice.log Log warn file /var/log/tor/warn.log
%include /etc/tor/torrc.d/
ConnDirectionStatistics 1
Hello,
I have a hard time trying to correctly update my configuration following this change, with Tor 0.4.5.2 on Ubuntu focal. The machine has both an IPv4 and IPv6 connectivity, but my relay must only use IPv4 to listen for connections.
The relevant parts of my configuration before moving to the 0.4.5 branch was: ``` ORPort 192.168.2.1:9001 NoAdvertise ORPort <public-ipv4>:9001 NoListen
Address <public-ipv4>
OutboundBindAddress 192.168.2.1 ```
Since 0.4.5, the order of the ORPort lines seem to matter.
* First case:
torrc ORPort lines: ``` ORPort 192.168.2.1:9001 NoAdvertise ORPort <public-ipv4>:9001 NoListen ```
Log from `tor --verify-config -f torrc`: ``` Nov 27 11:26:30.043 [warn] We are advertising an ORPort, but not actually listening on one. Nov 27 11:26:30.043 [warn] Failed to parse/validate config: Misconfigured server ports Nov 27 11:26:30.043 [err] Reading config failed--see warnings above. ```
* Second case:
torrc ORPort lines: ``` ORPort <public-ipv4>:9001 NoListen ORPort 192.168.2.1:9001 NoAdvertise ```
Log from `tor --verify-config -f torrc`:
``` Nov 27 11:29:17.236 [warn] We are listening on an ORPort, but not advertising any ORPorts. This will keep us from building a router descriptor, and make us impossible to use. Nov 27 11:29:17.237 [warn] Failed to parse/validate config: Misconfigured server ports Nov 27 11:29:17.237 [err] Reading config failed--see warnings above. ```
It looks like the second ORPort line always supersedes the first one?
Finally, by changing the configuration to:
``` ORPort 192.168.2.1:9001 NoAdvertise OrPort 9001 NoListen IPv4Only ```
Log from `tor --verify-config -f torrc`:
``` Nov 27 11:34:12.699 [warn] Could not interpret ORPort address as IPv4 Nov 27 11:34:12.699 [warn] Failed to parse/validate config: Invalid ORPort configuration Nov 27 11:34:12.699 [err] Reading config failed--see warnings above. ```
So I am unsure what is the correct approach with what I am trying to achieve. I am not sure if I am missing something or if it's a bug in the new feature?
Thanks,
On 22/07/2020 21:54, David Goulet wrote:
Greetings everyone!
We've very recently merged upstream (tor.git) full IPv6 supports which implies many many things. We are still finalizing the work but most of it is in at the moment.
This is a call for help if anyone would like to test either git master[1] or nightly builds[2] (only Debian) to test for us a specific feature.
The feature we would love for some of you to test is the IPv6 address discovery. In short, with this new feature, specifying an ORPort without an address will automatically bind tor to [::]:<port> and attempt to find the IPv6 address by looking at (in this order):
- "Address" from torrc
- "ORPort address:port" from torrc
- Interface address. First public IPv6 is used.
- Local hostname, DNS AAAA query.
If all fails, the relay will simply never publish an IPv6 in the descriptor but it will work properly with the IPv4 (still mandatory).
The other new thing is that now tor supports *two* "Address" statement which can be a hostname or IPv4 or IPv6 now.
Thus this is now valid:
Address 1.2.3.4 Address [4242::4242] ORPort 9001
Your Tor will bind to 0.0.0.0:9001 and [::]:9001 but will publish the 1.2.3.4 for the IPv4 address and [4242::4242] for IPv6 in the descriptor that is the address to use to reach your relay's ORPort.
Now, if you happen to have this configuration which I believe might be common at the moment:
ORPort 9001 ORPort [4242::4242]:9001
The second ORPort which specifies an IPv6 address will supersede the "ORPort 9001" which uses [::] and thus you will bind on 0.0.0.0:9001 and [4242::4242]:9001. You should get a notice log about this.
Thus the recommended configuration to avoid that log notice would be to bind to specific addresses per family:
ORPort <IPv4>:9001 ORPort <IPv6>:9001
And of course, if you want your relay to _not_ listen on IPv6:
ORPort 9001 IPv4Only
In your notice log, you will see which address is used to bind on the ORPort and then you will see the reachability test succeed or not on the address that tor either used from the configuration or auto discovered that is the address you are supposedly reachable from.
Man page has NOT been updated yet, it will arrive once we stabilize the IPv6 feature and everything around it.
Please, do report (on this thread) _anything_ even slightly annoying about this like logging or lack of logging and so on. This is a complex feature and errors can be made thus any testing you can offer is extremely appreciated.
Thanks!! David
[1] https://gitweb.torproject.org/tor.git/ [2] https://2019.www.torproject.org/docs/debian.html.en
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor@fr33tux.org wrote:
Hello,
I have a hard time trying to correctly update my configuration following this change, with Tor 0.4.5.2 on Ubuntu focal. The machine has both an IPv4 and IPv6 connectivity, but my relay must only use IPv4 to listen for connections.
The relevant parts of my configuration before moving to the 0.4.5 branch was:
ORPort 192.168.2.1:9001 NoAdvertise ORPort <public-ipv4>:9001 NoListen Address <public-ipv4> OutboundBindAddress 192.168.2.1
Since 0.4.5, the order of the ORPort lines seem to matter.
- First case:
torrc ORPort lines:
ORPort 192.168.2.1:9001 NoAdvertise ORPort <public-ipv4>:9001 NoListen
Log from `tor --verify-config -f torrc`:
Nov 27 11:26:30.043 [warn] We are advertising an ORPort, but not actually listening on one. Nov 27 11:26:30.043 [warn] Failed to parse/validate config: Misconfigured server ports Nov 27 11:26:30.043 [err] Reading config failed--see warnings above.
- Second case:
torrc ORPort lines:
ORPort <public-ipv4>:9001 NoListen ORPort 192.168.2.1:9001 NoAdvertise
Log from `tor --verify-config -f torrc`:
Nov 27 11:29:17.236 [warn] We are listening on an ORPort, but not advertising any ORPorts. This will keep us from building a router descriptor, and make us impossible to use. Nov 27 11:29:17.237 [warn] Failed to parse/validate config: Misconfigured server ports Nov 27 11:29:17.237 [err] Reading config failed--see warnings above.
It looks like the second ORPort line always supersedes the first one?
Finally, by changing the configuration to:
ORPort 192.168.2.1:9001 NoAdvertise OrPort 9001 NoListen IPv4Only
Log from `tor --verify-config -f torrc`:
Nov 27 11:34:12.699 [warn] Could not interpret ORPort address as IPv4 Nov 27 11:34:12.699 [warn] Failed to parse/validate config: Invalid ORPort configuration Nov 27 11:34:12.699 [err] Reading config failed--see warnings above.
So I am unsure what is the correct approach with what I am trying to achieve. I am not sure if I am missing something or if it's a bug in the new feature?
Thanks,
Hello,
It won't work, maybe because it was broken in the latest alpha.
I already filed a ticket about it:
https://gitlab.torproject.org/tpo/core/tor/-/issues/40205
and
https://gitlab.torproject.org/tpo/core/tor/-/issues/40208
Feel free to comment there with your setup scenarios, or if you don't have a gitlab account I'll link this mail post there.
Try this: - first disable IPv6 from the box entirely, because of https://gitlab.torproject.org/tpo/core/tor/-/issues/40205
- Set just this in your torrc (and it will guess Address): ORPort 192.168.2.1:9001
However, your examples look correct setups and are not directly related to those gitlab issues which represent different environments and setups -- can you please paste your entire torrc and make sure 192.168.2.1 or whatever LAN IP you have is the correct LAN IP assigned to this box and that port is free? Also do you set Address?
I would ask you to stay on alpha and not roll back to a previous version as we need to fix this, and the more people test it the better.
Hi
Am 27.11.2020 um 11:43 schrieb tor@fr33tux.org:
The relevant parts of my configuration before moving to the 0.4.5 branch was:
ORPort 192.168.2.1:9001 NoAdvertise ORPort <public-ipv4>:9001 NoListen Address <public-ipv4> OutboundBindAddress 192.168.2.1
A silly question to double check: That really worked? I don't use OutboundBindAddress but given the name "outbound-bind-address" the outbound traffic has to bind to a public IP. And 192.168/16 is not public.
For what it's worth. -- Cheers, Felix
tor-relays@lists.torproject.org