Skip to content

os-tor: Gets stuck in dormant state #1496

@gwk001

Description

@gwk001

Had this working with transparent proxy in 18.7. It broke at some point (I only use it rarely), and I couldn't get it to work again under 19.1. I did a fresh install for 19.7.1 and rebuilt my rules from scratch, and it started working again. I then upgraded to 19.7.2 and it broke again with Bootstrapping stuck on 0%. 19.7.3 did the same thing. Reverting to opnsense 19.7.1 did not fix. Not sure if it's a plugin issue, core, or some interaction.

Relatively simple setup- single firewall with a bridged ADSL modem on DHCP. Have spent literally days on this. Among other things, tried with "disable force gateway" enabled and disabled. Other local services like NTP and Unbound work. MTU appears to be defaulting to 1492.

torrc

##
## OPNsense autogenerated config file.
## Don't change it because your changes get lost.
##
##

SOCKSPort 127.0.0.1:9050 # localhost IPv4
SOCKSPort [::1]:9050     # localhost IPv6


SOCKSPolicy accept 192.168.XXX.0/24

SOCKSPolicy reject *
SOCKSPolicy reject6 *


Log notice syslog


Scheduler KISTLite,Vanilla

DataDirectory /var/db/tor

ControlPort 9051
HashedControlPassword XXX


FascistFirewall 0

TransPort 9040
DNSPort 9053
VirtualAddrNetwork 172.29.0.0/16
AutomapHostsOnResolve 1

## Client Authentication

syslog

Tor[5597]: Tor 0.4.1.5 running on FreeBSD with Libevent 2.1.11-stable, OpenSSL LibreSSL 2.9.2, Zlib 1.2.11, Liblzma 5.2.3, and Libzstd 1.4.3.
Tor[5597]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Tor[5597]: Read configuration file "/usr/local/etc/tor/torrc".
Tor[5597]: The abbreviation 'Scheduler' is deprecated. Please use 'SchedulerLowWaterMark__' instead
Tor[5597]: Skipping obsolete configuration option 'SchedulerLowWaterMark__'
Tor[5597]: Opening Socks listener on 127.0.0.1:9050
Tor[5597]: Opened Socks listener on 127.0.0.1:9050
Tor[5597]: Opening Socks listener on [::1]:9050
Tor[5597]: Opened Socks listener on [::1]:9050
Tor[5597]: Opening DNS listener on 127.0.0.1:9053
Tor[5597]: Opened DNS listener on 127.0.0.1:9053
Tor[5597]: Opening Transparent pf/netfilter listener on 127.0.0.1:9040
Tor[5597]: Opened Transparent pf/netfilter listener on 127.0.0.1:9040
Tor[5597]: Opening Control listener on 127.0.0.1:9051
Tor[5597]: Opened Control listener on 127.0.0.1:9051
Tor[5597]: Parsing GEOIP IPv4 file /usr/local/share/tor/geoip.
Tor[5597]: Parsing GEOIP IPv6 file /usr/local/share/tor/geoip6.
Tor[5597]: We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster.
Tor[5597]: Bootstrapped 0% (starting): Starting
Tor[5597]: Starting with guard context "default"

Metadata

Metadata

Assignees

No one assigned

    Labels

    supportCommunity support or awaiting triage

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions