Help - Debian 12 Tor logs won't show latest logs but Relay Search says online

Relay Search indicates that the relay has uptime of over 10 hours and but the tor logs are stuck at Jan 15 03:50:22.000. Am I supposed to do something to see the latest logs like how in Fedora, you have to press “down” or “PgDn?” Entering systemctl enable tor.service or systemctl start tor.service does not change the log output times. I previously had a relay running on the same IP address, different distro and then wiped the machine and followed the relay guide for Debian (but didn’t import the identity files); could this have any impact on my log results not updating? My torrc file has the following changes:

SOCKSPort 0
Log notice file /var/log/tor/notices.log
ORPort 433
Nickname FreedomSpreader444
ContactInfo lovespreader444 AT protonmail dot com
ExitRelay 0

Below is the complete log:

root@debian-12:~# systemctl restart tor@default
root@debian-12:~# cat /var/log/tor/notices.log
Jan 15 02:54:46.000 [notice] Tor 0.4.8.13 opening new log file.
Jan 15 02:54:46.942 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 02:54:46.949 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 02:54:46.949 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 02:54:46.949 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 02:54:46.949 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 02:54:46.953 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 02:54:46.956 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 02:54:46.956 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 02:54:46.956 [notice] Opening OR listener on [::]:443
Jan 15 02:54:46.956 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 02:54:46.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 02:54:47.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 02:54:47.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 02:54:47.000 [notice] You are running a new relay. Thanks for helping the Tor network! If you wish to know what will happen in the upcoming weeks regarding its usage, have a look at https://blog.torproject.org/lifecycle-of-a-new-relay
Jan 15 02:54:47.000 [notice] It looks like I need to generate and sign a new medium-term signing key, because I don't have one. To do that, I need to load (or create) the permanent master identity key. If the master identity key was not moved or encrypted with a passphrase, this will be done automatically and no further action is required. Otherwise, provide the necessary data using 'tor --keygen' to do it manually.
Jan 15 02:54:48.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 02:54:48.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 02:54:48.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 02:54:49.000 [notice] Starting with guard context "default"
Jan 15 02:54:50.000 [notice] Signaled readiness to systemd
Jan 15 02:54:51.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 02:54:51.000 [notice] Opening Control listener on /run/tor/control
Jan 15 02:54:51.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 02:54:51.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 02:54:51.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 02:54:51.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 02:54:51.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 02:54:51.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 02:54:51.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 02:54:51.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 02:54:52.000 [notice] Bootstrapped 100% (done): Done
Jan 15 02:54:52.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 02:54:53.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 02:54:58.000 [notice] Performing bandwidth self-test...done.
Jan 15 02:55:07.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 02:55:08.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 02:55:37.000 [notice] Clean shutdown finished. Exiting.
Jan 15 02:55:37.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 02:55:37.963 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 02:55:37.969 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 02:55:37.969 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 02:55:37.969 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 02:55:37.969 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 02:55:37.970 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 02:55:37.972 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 02:55:37.972 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 02:55:37.972 [notice] Opening OR listener on [::]:443
Jan 15 02:55:37.972 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 02:55:38.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 02:55:38.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 02:55:38.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 02:55:39.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 02:55:39.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 02:55:39.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 02:55:40.000 [notice] Starting with guard context "default"
Jan 15 02:55:40.000 [notice] Signaled readiness to systemd
Jan 15 02:55:41.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 02:55:41.000 [notice] Opening Control listener on /run/tor/control
Jan 15 02:55:41.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 02:55:42.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 02:55:42.000 [notice] We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits pending. Waiting until some finish.
Jan 15 02:55:42.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 02:55:42.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 02:55:42.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 02:55:42.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 02:55:42.000 [notice] Bootstrapped 89% (ap_handshake): Finishing handshake with a relay to build circuits
Jan 15 02:55:42.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 02:55:42.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 02:55:43.000 [notice] Bootstrapped 100% (done): Done
Jan 15 02:55:43.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 02:55:47.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 02:55:49.000 [notice] Performing bandwidth self-test...done.
Jan 15 02:55:52.000 [notice] Your network connection speed appears to have changed. Resetting timeout to 60000ms after 18 timeouts and 101 buildtimes.
Jan 15 03:14:07.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:14:07.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:14:37.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:14:37.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:14:37.585 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:14:37.593 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:14:37.594 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:14:37.595 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:14:37.595 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:14:37.598 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:14:37.600 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:14:37.600 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:14:37.600 [notice] Opening OR listener on [::]:443
Jan 15 03:14:37.600 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:14:37.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:14:38.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:14:38.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:14:38.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:14:38.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:14:38.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:14:39.000 [notice] Starting with guard context "default"
Jan 15 03:14:45.000 [notice] Signaled readiness to systemd
Jan 15 03:14:46.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:14:46.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:14:46.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:14:46.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 03:14:46.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:14:46.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:14:46.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:14:46.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:14:46.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:14:46.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:14:47.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:14:47.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:14:48.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:15:38.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:15:38.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:16:08.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:16:08.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:16:08.414 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:16:08.420 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:16:08.420 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:16:08.420 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:16:08.421 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:16:08.423 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:16:08.425 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:16:08.425 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:16:08.425 [notice] Opening OR listener on [::]:443
Jan 15 03:16:08.425 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:16:08.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:16:08.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:16:09.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:16:09.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:16:09.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:16:09.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:16:10.000 [notice] Starting with guard context "default"
Jan 15 03:16:15.000 [notice] Signaled readiness to systemd
Jan 15 03:16:15.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:16:16.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:16:45.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:16:45.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:16:45.871 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:16:45.879 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:16:45.879 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:16:45.879 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:16:45.879 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:16:45.881 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:16:45.884 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:16:45.884 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:16:45.884 [notice] Opening OR listener on [::]:443
Jan 15 03:16:45.884 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:16:45.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:16:46.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:16:46.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:16:47.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:16:47.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:16:47.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:16:48.000 [notice] Starting with guard context "default"
Jan 15 03:16:52.000 [notice] Signaled readiness to systemd
Jan 15 03:16:52.000 [notice] External address seen and suggested by a directory authority: <IP address>.26
Jan 15 03:16:53.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:16:53.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:16:53.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:16:53.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 03:16:53.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:16:53.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:16:54.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:16:54.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:16:54.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:16:54.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:16:54.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:16:54.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:16:56.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:23:56.000 [notice] Performing bandwidth self-test...done.
Jan 15 03:27:48.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:27:48.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:28:18.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:30:13.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:30:13.244 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:30:13.250 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:30:13.250 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:30:13.251 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:30:13.251 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:30:13.253 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:30:13.255 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:30:13.255 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:30:13.255 [notice] Opening OR listener on [::]:443
Jan 15 03:30:13.255 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:30:13.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:30:13.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:30:14.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:30:14.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:30:14.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:30:14.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:30:15.000 [notice] Starting with guard context "default"
Jan 15 03:30:20.000 [notice] Signaled readiness to systemd
Jan 15 03:30:20.000 [notice] External address seen and suggested by a directory authority: <IP address>
Jan 15 03:30:21.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:30:21.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:30:21.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:30:21.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 03:30:21.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:30:21.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:30:21.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:30:21.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:30:21.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:30:21.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:30:22.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:30:22.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:30:23.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:31:19.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:31:20.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:31:49.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:32:09.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:32:09.966 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:32:09.971 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:32:09.972 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:32:09.972 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:32:09.973 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:32:09.974 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:32:09.976 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:32:09.977 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:32:09.977 [notice] Opening OR listener on [::]:443
Jan 15 03:32:09.977 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:32:10.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:32:10.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:32:10.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:32:11.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:32:11.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:32:11.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:32:12.000 [notice] Starting with guard context "default"
Jan 15 03:32:17.000 [notice] Signaled readiness to systemd
Jan 15 03:32:18.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:32:18.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:32:18.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:32:18.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 03:32:18.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:32:18.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:32:18.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:32:18.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:32:18.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:32:18.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:32:19.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:32:19.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:32:20.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:33:20.000 [notice] Performing bandwidth self-test...done.
Jan 15 03:41:26.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:41:26.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:41:56.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:41:56.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:41:56.377 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:41:56.381 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:41:56.382 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:41:56.382 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:41:56.382 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:41:56.383 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:41:56.385 [notice] Opening OR listener on 0.0.0.0:0
Jan 15 03:41:56.385 [notice] OR listener listening on port 42605.
Jan 15 03:41:56.385 [notice] Opened OR listener connection (ready) on 0.0.0.0:42605
Jan 15 03:41:56.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:41:56.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:41:57.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:41:58.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:41:58.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:41:58.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:41:59.000 [notice] Starting with guard context "default"
Jan 15 03:42:04.000 [notice] Signaled readiness to systemd
Jan 15 03:42:05.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:42:05.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:42:05.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:42:05.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:42:05.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:42:05.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:42:05.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:42:05.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:42:05.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:42:06.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:42:06.000 [notice] Now checking whether IPv4 ORPort <IP address>:42605 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:42:07.000 [notice] Self-testing indicates your ORPort <IP address>:42605 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:42:35.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:42:36.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:43:05.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:43:05.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:43:05.927 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:43:05.935 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:43:05.936 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:43:05.936 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:43:05.936 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:43:05.938 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:43:05.941 [notice] Opening OR listener on 0.0.0.0:0
Jan 15 03:43:05.941 [notice] OR listener listening on port 43419.
Jan 15 03:43:05.941 [notice] Opened OR listener connection (ready) on 0.0.0.0:43419
Jan 15 03:43:06.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:43:06.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:43:06.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:43:07.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:43:07.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:43:07.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:43:08.000 [notice] Starting with guard context "default"
Jan 15 03:43:12.000 [notice] Signaled readiness to systemd
Jan 15 03:43:13.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:43:13.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:43:13.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:43:14.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:43:14.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:43:14.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:43:14.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:43:14.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:43:14.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:43:14.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:43:14.000 [notice] Now checking whether IPv4 ORPort <IP address>:43419 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:43:15.000 [notice] Self-testing indicates your ORPort <IP address>:43419 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:43:20.000 [notice] Performing bandwidth self-test...done.
Jan 15 03:44:00.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:44:00.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:44:30.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:44:30.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:44:30.656 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:44:30.662 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:44:30.662 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:44:30.662 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:44:30.663 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:44:30.665 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:44:30.667 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:44:30.667 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:44:30.667 [notice] Opening OR listener on [::]:443
Jan 15 03:44:30.667 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:44:30.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:44:31.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:44:31.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:44:32.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:44:32.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:44:32.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:44:33.000 [notice] Starting with guard context "default"
Jan 15 03:44:37.000 [notice] Signaled readiness to systemd
Jan 15 03:44:38.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:44:38.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:44:38.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:44:38.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 03:44:39.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:44:39.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:44:39.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:44:39.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:44:39.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:44:39.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:44:39.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:44:39.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:44:43.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:45:00.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:45:00.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:45:30.000 [notice] Clean shutdown finished. Exiting.
Jan 15 03:45:30.000 [notice] Tor 0.4.8.13 opening log file.
Jan 15 03:45:30.950 [notice] We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compatible.
Jan 15 03:45:30.954 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 15 03:45:30.954 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 15 03:45:30.955 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 15 03:45:30.955 [notice] Read configuration file "/etc/tor/torrc".
Jan 15 03:45:30.956 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 15 03:45:30.956 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay to 0.
Jan 15 03:45:30.958 [notice] Opening OR listener on 0.0.0.0:443
Jan 15 03:45:30.958 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 15 03:45:30.958 [notice] Opening OR listener on [::]:443
Jan 15 03:45:30.958 [notice] Opened OR listener connection (ready) on [::]:443
Jan 15 03:45:30.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 15 03:45:31.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 15 03:45:31.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 15 03:45:32.000 [notice] Your Tor server's identity key fingerprint is '<fingerprint>'
Jan 15 03:45:32.000 [notice] Your Tor server's identity key ed25519 fingerprint is '<fingerprint>'
Jan 15 03:45:32.000 [notice] Bootstrapped 0% (starting): Starting
Jan 15 03:45:33.000 [notice] Starting with guard context "default"
Jan 15 03:45:37.000 [notice] Signaled readiness to systemd
Jan 15 03:45:38.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 15 03:45:39.000 [notice] Opening Control listener on /run/tor/control
Jan 15 03:45:39.000 [notice] Opened Control listener connection (ready) on /run/tor/control
Jan 15 03:45:39.000 [notice] Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 15 03:45:39.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 15 03:45:39.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 15 03:45:39.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 15 03:45:39.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 15 03:45:39.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 15 03:45:39.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 15 03:45:39.000 [notice] Bootstrapped 100% (done): Done
Jan 15 03:45:39.000 [notice] Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 15 03:45:41.000 [notice] Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 15 03:49:41.000 [notice] Performing bandwidth self-test...done.
Jan 15 03:49:52.000 [notice] Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 15 03:49:53.000 [notice] Delaying directory fetches: We are hibernating or shutting down.
Jan 15 03:50:22.000 [notice] Clean shutdown finished. Exiting.

Do you use logrotate?

I do (rarely) saw in the past that the .1 rotated file is used instead the new .log one.

Would the .1 rotated file also be located at /var/log/tor? And how can I see if it is activated?

If you didn’t installed + configured logrotate, then the issue has another root cause.

If you run systemctl status tor@default.service , do you see more recent logs? You could try journalctl -r -u tor@default. Maybe tor ignores your log configuration for some reason.

The relay currently running is named Freedomspreader44 not Freedomspreader444. Is this just a typo or have you posted the wrong torrc?

2 Likes

This does provide logs up to January 17th. Here’s the output:

root@debian-12:~# journalctl -r  -u tor@default
Jan 17 00:00:01 debian-12 systemd[1]: Reloaded tor@default.service - Anonymizing overlay network for TCP.
Jan 17 00:00:01 debian-12 Tor[590]: Read configuration file "/etc/tor/torrc".
Jan 17 00:00:01 debian-12 Tor[590]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 17 00:00:01 debian-12 Tor[590]: Received reload signal (hup). Reloading config and resetting internal state.
Jan 17 00:00:01 debian-12 systemd[1]: Reloading tor@default.service - Anonymizing overlay network for TCP...
Jan 16 20:24:54 debian-12 Tor[590]: Heartbeat: DoS mitigation since startup: 0 circuits killed with too many cells, 0 circuits rejected, 0 marked addresses, 0 marked addresses for max queue>
Jan 16 20:24:54 debian-12 Tor[590]: Since startup we initiated 0 and received 0 v1 connections; initiated 0 and received 0 v2 connections; initiated 0 and received 0 v3 connections; initiat>
Jan 16 20:24:54 debian-12 Tor[590]: Circuit handshake stats since last time: 0/0 TAP, 2080/2080 NTor.
Jan 16 20:24:54 debian-12 Tor[590]: While not bootstrapping, fetched this many bytes: 14195236 (server descriptor fetch); 1080 (server descriptor upload); 829560 (consensus network-status f>
Jan 16 20:24:54 debian-12 Tor[590]: While bootstrapping, fetched this many bytes: 14071 (consensus network-status fetch)
Jan 16 20:24:54 debian-12 Tor[590]: Heartbeat: Tor's uptime is 18:00 hours, with 1 circuits open. I've sent 139.24 MB and received 147.65 MB. I've received 5416 connections on IPv4 and 0 on>
Jan 16 14:24:54 debian-12 Tor[590]: Heartbeat: DoS mitigation since startup: 0 circuits killed with too many cells, 0 circuits rejected, 0 marked addresses, 0 marked addresses for max queue>
Jan 16 14:24:54 debian-12 Tor[590]: Since startup we initiated 0 and received 0 v1 connections; initiated 0 and received 0 v2 connections; initiated 0 and received 0 v3 connections; initiat>
Jan 16 14:24:54 debian-12 Tor[590]: Circuit handshake stats since last time: 0/0 TAP, 1918/1918 NTor.
Jan 16 14:24:54 debian-12 Tor[590]: While not bootstrapping, fetched this many bytes: 9368930 (server descriptor fetch); 1080 (server descriptor upload); 544481 (consensus network-status fe>
Jan 16 14:24:54 debian-12 Tor[590]: While bootstrapping, fetched this many bytes: 14071 (consensus network-status fetch)
Jan 16 14:24:54 debian-12 Tor[590]: Heartbeat: Tor's uptime is 12:00 hours, with 2 circuits open. I've sent 77.98 MB and received 83.86 MB. I've received 3345 connections on IPv4 and 0 on I>
Jan 16 08:24:54 debian-12 Tor[590]: Heartbeat: DoS mitigation since startup: 0 circuits killed with too many cells, 0 circuits rejected, 0 marked addresses, 0 marked addresses for max queue>
Jan 16 08:24:54 debian-12 Tor[590]: Since startup we initiated 0 and received 0 v1 connections; initiated 0 and received 0 v2 connections; initiated 0 and received 0 v3 connections; initiat>
Jan 16 08:24:54 debian-12 Tor[590]: Circuit handshake stats since last time: 0/0 TAP, 1311/1311 NTor.
Jan 16 08:24:54 debian-12 Tor[590]: While not bootstrapping, fetched this many bytes: 5865227 (server descriptor fetch); 1080 (server descriptor upload); 313999 (consensus network-status fe>
Jan 16 08:24:54 debian-12 Tor[590]: While bootstrapping, fetched this many bytes: 14071 (consensus network-status fetch)
Jan 16 08:24:54 debian-12 Tor[590]: Heartbeat: Tor's uptime is 6:00 hours, with 0 circuits open. I've sent 46.17 MB and received 50.74 MB. I've received 1406 connections on IPv4 and 0 on IP>
Jan 16 03:50:26 debian-12 Tor[590]: Possible compression bomb; abandoning stream.
Jan 16 03:50:26 debian-12 Tor[590]: Detected possible compression bomb with input size = 18597 and output size = 487008
Jan 16 03:50:26 debian-12 Tor[590]: Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 45.66.35.11:80).
Jan 16 03:50:26 debian-12 Tor[590]: Possible compression bomb; abandoning stream.
Jan 16 03:50:26 debian-12 Tor[590]: Detected possible compression bomb with input size = 23002 and output size = 646719
Jan 16 02:28:55 debian-12 Tor[590]: Performing bandwidth self-test...done.
Jan 16 02:24:57 debian-12 Tor[590]: Self-testing indicates your ORPort <IP address>:433 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 02:24:56 debian-12 Tor[590]: Now checking whether IPv4 ORPort <IP address>:433 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 02:24:56 debian-12 Tor[590]: Bootstrapped 100% (done): Done
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 02:24:54 debian-12 Tor[590]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 02:24:54 debian-12 Tor[590]: Opening Control listener on /run/tor/control
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 02:24:53 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:24:53 debian-12 Tor[590]: Signaled readiness to systemd
Jan 16 02:24:42 debian-12 Tor[590]: Starting with guard context "default"
Jan 16 02:24:41 debian-12 Tor[590]: Bootstrapped 0% (starting): Starting
Jan 16 02:24:41 debian-12 Tor[590]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader44 <identity key>'
Jan 16 02:24:41 debian-12 Tor[590]: Your Tor server's identity key fingerprint is 'FreedomSpreader44 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 02:24:40 debian-12 Tor[590]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 02:24:40 debian-12 Tor[590]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 02:24:39 debian-12 Tor[590]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 02:24:39 debian-12 Tor[590]: Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:24:39 debian-12 Tor[590]: Opening OR listener on 0.0.0.0:433
Jan 16 02:24:39 debian-12 Tor[590]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay>
Jan 16 02:24:39 debian-12 Tor[590]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:24:39 debian-12 Tor[590]: Read configuration file "/etc/tor/torrc".
Jan 16 02:24:39 debian-12 Tor[590]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:24:39 debian-12 Tor[590]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:24:39 debian-12 Tor[590]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 02:24:39 debian-12 Tor[590]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compat>
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.037 [notice] Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.037 [notice] Opening OR listener on 0.0.0.0:433
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.035 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.034 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:24:38 debian-12 tor[589]: Configuration was valid
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.956 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.955 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.953 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.953 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.953 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.952 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:24:38 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:24:38 debian-12 systemd[1]: tor@default.service: Consumed 14.413s CPU time.
Jan 16 02:24:38 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:24:38 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 02:24:38 debian-12 Tor[579]: Clean shutdown finished. Exiting.
Jan 16 02:24:09 debian-12 Tor[579]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 02:24:08 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:24:08 debian-12 Tor[579]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 02:22:46 debian-12 Tor[579]: Self-testing indicates your ORPort <IP address>:433 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 02:22:45 debian-12 Tor[579]: Now checking whether IPv4 ORPort <IP address>:433 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 02:22:45 debian-12 Tor[579]: Bootstrapped 100% (done): Done
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 02:22:44 debian-12 Tor[579]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 02:22:44 debian-12 Tor[579]: Opening Control listener on /run/tor/control
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 02:22:43 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:22:43 debian-12 Tor[579]: Signaled readiness to systemd
Jan 16 02:22:32 debian-12 Tor[579]: Starting with guard context "default"
Jan 16 02:22:31 debian-12 Tor[579]: Bootstrapped 0% (starting): Starting
Jan 16 02:22:31 debian-12 Tor[579]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 02:22:31 debian-12 Tor[579]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 02:22:31 debian-12 Tor[579]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 02:22:31 debian-12 Tor[579]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 02:22:30 debian-12 Tor[579]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 02:22:29 debian-12 Tor[579]: Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:22:29 debian-12 Tor[579]: Opening OR listener on 0.0.0.0:433
Jan 16 02:22:29 debian-12 Tor[579]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay>
Jan 16 02:22:29 debian-12 Tor[579]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:22:29 debian-12 Tor[579]: Read configuration file "/etc/tor/torrc".
Jan 16 02:22:29 debian-12 Tor[579]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:22:29 debian-12 Tor[579]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:22:29 debian-12 Tor[579]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 02:22:29 debian-12 Tor[579]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compat>
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.872 [notice] Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.872 [notice] Opening OR listener on 0.0.0.0:433
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.870 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.870 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:22:29 debian-12 tor[577]: Configuration was valid
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.806 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.806 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.802 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.802 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.801 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.801 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:22:29 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:22:29 debian-12 systemd[1]: tor@default.service: Consumed 1min 3.115s CPU time.
Jan 16 02:22:29 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:22:29 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 02:22:29 debian-12 Tor[457]: Clean shutdown finished. Exiting.
Jan 16 02:22:00 debian-12 Tor[457]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 02:21:59 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:21:59 debian-12 Tor[457]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:55:26 debian-12 Tor[457]: Performing bandwidth self-test...done.
Jan 16 00:50:24 debian-12 Tor[457]: Self-testing indicates your ORPort <IP address>:40195 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:50:22 debian-12 Tor[457]: Now checking whether IPv4 ORPort <IP address>:40195 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 100% (done): Done
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:50:22 debian-12 Tor[457]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:50:22 debian-12 Tor[457]: Opening Control listener on /run/tor/control
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:50:20 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:50:20 debian-12 Tor[457]: Signaled readiness to systemd
Jan 16 00:50:10 debian-12 Tor[457]: Starting with guard context "default"
Jan 16 00:50:08 debian-12 Tor[457]: Bootstrapped 0% (starting): Starting
Jan 16 00:50:08 debian-12 Tor[457]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:50:08 debian-12 Tor[457]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:50:07 debian-12 Tor[457]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:50:07 debian-12 Tor[457]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:50:07 debian-12 Tor[457]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:50:05 debian-12 Tor[457]: Opened OR listener connection (ready) on 0.0.0.0:40195
Jan 16 00:50:05 debian-12 Tor[457]: OR listener listening on port 40195.
Jan 16 00:50:05 debian-12 Tor[457]: Opening OR listener on 0.0.0.0:0
Jan 16 00:50:05 debian-12 Tor[457]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay>
Jan 16 00:50:05 debian-12 Tor[457]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:50:05 debian-12 Tor[457]: Read configuration file "/etc/tor/torrc".
Jan 16 00:50:05 debian-12 Tor[457]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:50:05 debian-12 Tor[457]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:50:05 debian-12 Tor[457]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:50:05 debian-12 Tor[457]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compat>
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.540 [notice] Opened OR listener connection (ready) on 0.0.0.0:40195
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.540 [notice] OR listener listening on port 40195.
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.539 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.536 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.536 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.532 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.532 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.532 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.531 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 00:50:05 debian-12 tor[452]: Configuration was valid
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.450 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.450 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.447 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.447 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.446 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.445 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 00:50:05 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
-- Boot 7eb81984df8f4ae380ca2822182d9a59 --
Jan 16 00:49:36 debian-12 systemd[1]: tor@default.service: Consumed 14.059s CPU time.
Jan 16 00:49:36 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:49:36 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:49:35 debian-12 Tor[2028]: Clean shutdown finished. Exiting.
Jan 16 00:49:06 debian-12 Tor[2028]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:49:05 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:49:05 debian-12 Tor[2028]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:45:53 debian-12 Tor[2028]: Self-testing indicates your ORPort <IP address>:39875 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:45:52 debian-12 Tor[2028]: Now checking whether IPv4 ORPort <IP address>:39875 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:45:52 debian-12 Tor[2028]: Bootstrapped 100% (done): Done
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:45:51 debian-12 Tor[2028]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:45:51 debian-12 Tor[2028]: Opening Control listener on /run/tor/control
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:45:50 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:45:50 debian-12 Tor[2028]: Signaled readiness to systemd
Jan 16 00:45:40 debian-12 Tor[2028]: Starting with guard context "default"
Jan 16 00:45:39 debian-12 Tor[2028]: Bootstrapped 0% (starting): Starting
Jan 16 00:45:39 debian-12 Tor[2028]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:45:39 debian-12 Tor[2028]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:45:39 debian-12 Tor[2028]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:45:38 debian-12 Tor[2028]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:45:38 debian-12 Tor[2028]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:45:37 debian-12 Tor[2028]: Opened OR listener connection (ready) on 0.0.0.0:39875
Jan 16 00:45:37 debian-12 Tor[2028]: OR listener listening on port 39875.
Jan 16 00:45:37 debian-12 Tor[2028]: Opening OR listener on 0.0.0.0:0
Jan 16 00:45:37 debian-12 Tor[2028]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:45:37 debian-12 Tor[2028]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:45:37 debian-12 Tor[2028]: Read configuration file "/etc/tor/torrc".
Jan 16 00:45:37 debian-12 Tor[2028]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:45:37 debian-12 Tor[2028]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:45:37 debian-12 Tor[2028]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:45:37 debian-12 Tor[2028]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.444 [notice] Opened OR listener connection (ready) on 0.0.0.0:39875
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.444 [notice] OR listener listening on port 39875.
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.444 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.441 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.441 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:45:37 debian-12 tor[2027]: Configuration was valid
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.375 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.375 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:45:37 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:44:59 debian-12 systemd[1]: tor@default.service: Consumed 14.090s CPU time.
Jan 16 00:44:59 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:44:59 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:44:59 debian-12 Tor[2005]: Clean shutdown finished. Exiting.
Jan 16 00:44:29 debian-12 Tor[2005]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:44:29 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:44:29 debian-12 Tor[2005]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:42:10 debian-12 Tor[2005]: Self-testing indicates your ORPort <IP address>:37083 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:42:09 debian-12 Tor[2005]: Now checking whether IPv4 ORPort <IP address>:37083 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:42:09 debian-12 Tor[2005]: Bootstrapped 100% (done): Done
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:42:08 debian-12 Tor[2005]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:42:08 debian-12 Tor[2005]: Opening Control listener on /run/tor/control
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:42:07 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:42:07 debian-12 Tor[2005]: Signaled readiness to systemd
Jan 16 00:41:57 debian-12 Tor[2005]: Starting with guard context "default"
Jan 16 00:41:56 debian-12 Tor[2005]: Bootstrapped 0% (starting): Starting
Jan 16 00:41:56 debian-12 Tor[2005]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:41:56 debian-12 Tor[2005]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:41:55 debian-12 Tor[2005]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:41:55 debian-12 Tor[2005]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:41:55 debian-12 Tor[2005]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:41:54 debian-12 Tor[2005]: Opened OR listener connection (ready) on 0.0.0.0:37083
Jan 16 00:41:54 debian-12 Tor[2005]: OR listener listening on port 37083.
Jan 16 00:41:54 debian-12 Tor[2005]: Opening OR listener on 0.0.0.0:0
Jan 16 00:41:54 debian-12 Tor[2005]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:41:54 debian-12 Tor[2005]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:41:54 debian-12 Tor[2005]: Read configuration file "/etc/tor/torrc".
Jan 16 00:41:54 debian-12 Tor[2005]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:41:54 debian-12 Tor[2005]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:41:54 debian-12 Tor[2005]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:41:54 debian-12 Tor[2005]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.261 [notice] Opened OR listener connection (ready) on 0.0.0.0:37083
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.261 [notice] OR listener listening on port 37083.
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.261 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.259 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.258 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:41:54 debian-12 tor[2003]: Configuration was valid
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.176 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.175 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:41:54 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:41:54 debian-12 systemd[1]: tor@default.service: Consumed 14.462s CPU time.
Jan 16 00:41:54 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:41:54 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:41:53 debian-12 Tor[1992]: Clean shutdown finished. Exiting.
Jan 16 00:41:24 debian-12 Tor[1992]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:41:23 debian-12 Tor[1992]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:41:23 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:40:36 debian-12 Tor[1992]: Performing bandwidth self-test...done.
Jan 16 00:39:37 debian-12 Tor[1992]: Self-testing indicates your ORPort <IP address>:40607 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:39:35 debian-12 Tor[1992]: Now checking whether IPv4 ORPort <IP address>:40607 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 100% (done): Done
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:39:35 debian-12 Tor[1992]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:39:35 debian-12 Tor[1992]: Opening Control listener on /run/tor/control
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:39:34 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:39:34 debian-12 Tor[1992]: Signaled readiness to systemd
Jan 16 00:39:24 debian-12 Tor[1992]: Starting with guard context "default"
Jan 16 00:39:23 debian-12 Tor[1992]: Bootstrapped 0% (starting): Starting
Jan 16 00:39:23 debian-12 Tor[1992]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:39:23 debian-12 Tor[1992]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:39:22 debian-12 Tor[1992]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:39:21 debian-12 Tor[1992]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:39:21 debian-12 Tor[1992]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:39:20 debian-12 Tor[1992]: Opened OR listener connection (ready) on 0.0.0.0:40607
Jan 16 00:39:20 debian-12 Tor[1992]: OR listener listening on port 40607.
Jan 16 00:39:20 debian-12 Tor[1992]: Opening OR listener on 0.0.0.0:0
Jan 16 00:39:20 debian-12 Tor[1992]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:39:20 debian-12 Tor[1992]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:39:20 debian-12 Tor[1992]: Read configuration file "/etc/tor/torrc".
Jan 16 00:39:20 debian-12 Tor[1992]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:39:20 debian-12 Tor[1992]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:39:20 debian-12 Tor[1992]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:39:20 debian-12 Tor[1992]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.747 [notice] Opened OR listener connection (ready) on 0.0.0.0:40607
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.747 [notice] OR listener listening on port 40607.
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.747 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.746 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.746 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:39:20 debian-12 tor[1991]: Configuration was valid
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.693 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.693 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:39:20 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:39:20 debian-12 systemd[1]: tor@default.service: Consumed 15.561s CPU time.
Jan 16 00:39:20 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:39:20 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:39:20 debian-12 Tor[1975]: Clean shutdown finished. Exiting.
Jan 16 00:38:50 debian-12 Tor[1975]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:38:50 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:38:50 debian-12 Tor[1975]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:32:57 debian-12 Tor[1975]: Self-testing indicates your ORPort <IP address>:38995 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:32:56 debian-12 Tor[1975]: Now checking whether IPv4 ORPort <IP address>:38995 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:32:56 debian-12 Tor[1975]: Bootstrapped 100% (done): Done
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:32:55 debian-12 Tor[1975]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:32:55 debian-12 Tor[1975]: Opening Control listener on /run/tor/control
Jan 16 00:32:55 debian-12 Tor[1975]: Opened Socks listener connection (ready) on /run/tor/socks
Jan 16 00:32:55 debian-12 Tor[1975]: Opening Socks listener on /run/tor/socks
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:32:54 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:32:54 debian-12 Tor[1975]: Signaled readiness to systemd
Jan 16 00:32:43 debian-12 Tor[1975]: Starting with guard context "default"
Jan 16 00:32:42 debian-12 Tor[1975]: Bootstrapped 0% (starting): Starting
Jan 16 00:32:42 debian-12 Tor[1975]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:32:42 debian-12 Tor[1975]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:32:41 debian-12 Tor[1975]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:32:41 debian-12 Tor[1975]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:32:41 debian-12 Tor[1975]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:32:40 debian-12 Tor[1975]: Opened OR listener connection (ready) on 0.0.0.0:38995
Jan 16 00:32:40 debian-12 Tor[1975]: OR listener listening on port 38995.
Jan 16 00:32:40 debian-12 Tor[1975]: Opening OR listener on 0.0.0.0:0
Jan 16 00:32:40 debian-12 Tor[1975]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 Tor[1975]: Opening Socks listener on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 Tor[1975]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:32:40 debian-12 Tor[1975]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:32:40 debian-12 Tor[1975]: Read configuration file "/etc/tor/torrc".
Jan 16 00:32:40 debian-12 Tor[1975]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:32:40 debian-12 Tor[1975]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:32:40 debian-12 Tor[1975]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:32:40 debian-12 Tor[1975]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opened OR listener connection (ready) on 0.0.0.0:38995
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] OR listener listening on port 38995.
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.215 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.215 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:32:40 debian-12 tor[1974]: Configuration was valid
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.126 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.126 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:32:40 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:32:40 debian-12 systemd[1]: tor@default.service: Consumed 15.079s CPU time.
Jan 16 00:32:40 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:32:40 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:32:39 debian-12 Tor[1961]: Clean shutdown finished. Exiting.
Jan 16 00:32:09 debian-12 Tor[1961]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:32:09 debian-12 Tor[1961]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:32:09 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:30:33 debian-12 Tor[1961]: Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:30:32 debian-12 Tor[1961]: Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 100% (done): Done
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:30:31 debian-12 Tor[1961]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:30:31 debian-12 Tor[1961]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:30:31 debian-12 Tor[1961]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:30:31 debian-12 Tor[1961]: Opening Control listener on /run/tor/control
Jan 16 00:30:31 debian-12 Tor[1961]: Opened Socks listener connection (ready) on /run/tor/socks
Jan 16 00:30:31 debian-12 Tor[1961]: Opening Socks listener on /run/tor/socks
Jan 16 00:30:31 debian-12 Tor[1961]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:30:30 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:30:30 debian-12 Tor[1961]: Signaled readiness to systemd
Jan 16 00:30:19 debian-12 Tor[1961]: Starting with guard context "default"
Jan 16 00:30:18 debian-12 Tor[1961]: Bootstrapped 0% (starting): Starting
Jan 16 00:30:18 debian-12 Tor[1961]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:30:18 debian-12 Tor[1961]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:30:18 debian-12 Tor[1961]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:30:17 debian-12 Tor[1961]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:30:17 debian-12 Tor[1961]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:30:16 debian-12 Tor[1961]: Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:30:16 debian-12 Tor[1961]: Opening OR listener on 0.0.0.0:443
Jan 16 00:30:16 debian-12 Tor[1961]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 Tor[1961]: Opening Socks listener on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 Tor[1961]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:30:16 debian-12 Tor[1961]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:30:16 debian-12 Tor[1961]: Read configuration file "/etc/tor/torrc".
Jan 16 00:30:16 debian-12 Tor[1961]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:30:16 debian-12 Tor[1961]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:30:16 debian-12 Tor[1961]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:30:16 debian-12 Tor[1961]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opening OR listener on 0.0.0.0:443
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.688 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.688 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:30:16 debian-12 tor[1960]: Configuration was valid
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.596 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.596 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:30:16 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:30:16 debian-12 systemd[1]: tor@default.service: Consumed 14.491s CPU time.
Jan 16 00:30:16 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:30:16 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:30:16 debian-12 Tor[1948]: Clean shutdown finished. Exiting.
Jan 16 00:29:47 debian-12 Tor[1948]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:29:46 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:29:46 debian-12 Tor[1948]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:27:18 debian-12 Tor[1948]: Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:27:16 debian-12 Tor[1948]: Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 100% (done): Done
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:27:16 debian-12 Tor[1948]: Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 16 00:27:16 debian-12 Tor[1948]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:27:16 debian-12 Tor[1948]: Opening Control listener on /run/tor/control
Jan 16 00:27:16 debian-12 Tor[1948]: Opened Socks listener connection (ready) on /run/tor/socks
Jan 16 00:27:16 debian-12 Tor[1948]: Opening Socks listener on /run/tor/socks
Jan 16 00:27:15 debian-12 Tor[1948]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:27:14 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:27:14 debian-12 Tor[1948]: Signaled readiness to systemd
Jan 16 00:27:05 debian-12 Tor[1948]: Starting with guard context "default"
Jan 16 00:27:04 debian-12 Tor[1948]: Bootstrapped 0% (starting): Starting
Jan 16 00:27:04 debian-12 Tor[1948]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:27:04 debian-12 Tor[1948]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:27:03 debian-12 Tor[1948]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:27:03 debian-12 Tor[1948]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:27:02 debian-12 Tor[1948]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:27:01 debian-12 Tor[1948]: Opened OR listener connection (ready) on [::]:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opening OR listener on [::]:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opening OR listener on 0.0.0.0:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 Tor[1948]: Opening Socks listener on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 Tor[1948]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:27:01 debian-12 Tor[1948]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:27:01 debian-12 Tor[1948]: Read configuration file "/etc/tor/torrc".
Jan 16 00:27:01 debian-12 Tor[1948]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:27:01 debian-12 Tor[1948]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:27:01 debian-12 Tor[1948]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:27:01 debian-12 Tor[1948]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.821 [notice] Opened OR listener connection (ready) on [::]:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.821 [notice] Opening OR listener on [::]:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opening OR listener on 0.0.0.0:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.818 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.818 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:27:01 debian-12 tor[1947]: Configuration was valid
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.745 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.745 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.742 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:27:01 debi

Freedomspreader44 is correct, yesterday I changed it temporarily to test if it would update on the site.

This provides logs up to January 16th. Here’s the output:

root@debian-12:~# journalctl -r  -u tor@default
Jan 16 20:24:54 debian-12 Tor[590]: Heartbeat: DoS mitigation since startup: 0 circuits killed with too many cells, 0 circuits rejected, 0 marked addresses, 0 marked addresses for max queue>
Jan 16 20:24:54 debian-12 Tor[590]: Since startup we initiated 0 and received 0 v1 connections; initiated 0 and received 0 v2 connections; initiated 0 and received 0 v3 connections; initiat>
Jan 16 20:24:54 debian-12 Tor[590]: Circuit handshake stats since last time: 0/0 TAP, 2080/2080 NTor.
Jan 16 20:24:54 debian-12 Tor[590]: While not bootstrapping, fetched this many bytes: 14195236 (server descriptor fetch); 1080 (server descriptor upload); 829560 (consensus network-status f>
Jan 16 20:24:54 debian-12 Tor[590]: While bootstrapping, fetched this many bytes: 14071 (consensus network-status fetch)
Jan 16 20:24:54 debian-12 Tor[590]: Heartbeat: Tor's uptime is 18:00 hours, with 1 circuits open. I've sent 139.24 MB and received 147.65 MB. I've received 5416 connections on IPv4 and 0 on>
Jan 16 14:24:54 debian-12 Tor[590]: Heartbeat: DoS mitigation since startup: 0 circuits killed with too many cells, 0 circuits rejected, 0 marked addresses, 0 marked addresses for max queue>
Jan 16 14:24:54 debian-12 Tor[590]: Since startup we initiated 0 and received 0 v1 connections; initiated 0 and received 0 v2 connections; initiated 0 and received 0 v3 connections; initiat>
Jan 16 14:24:54 debian-12 Tor[590]: Circuit handshake stats since last time: 0/0 TAP, 1918/1918 NTor.
Jan 16 14:24:54 debian-12 Tor[590]: While not bootstrapping, fetched this many bytes: 9368930 (server descriptor fetch); 1080 (server descriptor upload); 544481 (consensus network-status fe>
Jan 16 14:24:54 debian-12 Tor[590]: While bootstrapping, fetched this many bytes: 14071 (consensus network-status fetch)
Jan 16 14:24:54 debian-12 Tor[590]: Heartbeat: Tor's uptime is 12:00 hours, with 2 circuits open. I've sent 77.98 MB and received 83.86 MB. I've received 3345 connections on IPv4 and 0 on I>
Jan 16 08:24:54 debian-12 Tor[590]: Heartbeat: DoS mitigation since startup: 0 circuits killed with too many cells, 0 circuits rejected, 0 marked addresses, 0 marked addresses for max queue>
Jan 16 08:24:54 debian-12 Tor[590]: Since startup we initiated 0 and received 0 v1 connections; initiated 0 and received 0 v2 connections; initiated 0 and received 0 v3 connections; initiat>
Jan 16 08:24:54 debian-12 Tor[590]: Circuit handshake stats since last time: 0/0 TAP, 1311/1311 NTor.
Jan 16 08:24:54 debian-12 Tor[590]: While not bootstrapping, fetched this many bytes: 5865227 (server descriptor fetch); 1080 (server descriptor upload); 313999 (consensus network-status fe>
Jan 16 08:24:54 debian-12 Tor[590]: While bootstrapping, fetched this many bytes: 14071 (consensus network-status fetch)
Jan 16 08:24:54 debian-12 Tor[590]: Heartbeat: Tor's uptime is 6:00 hours, with 0 circuits open. I've sent 46.17 MB and received 50.74 MB. I've received 1406 connections on IPv4 and 0 on IP>
Jan 16 03:50:26 debian-12 Tor[590]: Possible compression bomb; abandoning stream.
Jan 16 03:50:26 debian-12 Tor[590]: Detected possible compression bomb with input size = 18597 and output size = 487008
Jan 16 03:50:26 debian-12 Tor[590]: Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 45.66.35.11:80).
Jan 16 03:50:26 debian-12 Tor[590]: Possible compression bomb; abandoning stream.
Jan 16 03:50:26 debian-12 Tor[590]: Detected possible compression bomb with input size = 23002 and output size = 646719
Jan 16 02:28:55 debian-12 Tor[590]: Performing bandwidth self-test...done.
Jan 16 02:24:57 debian-12 Tor[590]: Self-testing indicates your ORPort <IP address>:433 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 02:24:56 debian-12 Tor[590]: Now checking whether IPv4 ORPort <IP address>:433 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 02:24:56 debian-12 Tor[590]: Bootstrapped 100% (done): Done
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 02:24:54 debian-12 Tor[590]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 02:24:54 debian-12 Tor[590]: Opening Control listener on /run/tor/control
Jan 16 02:24:54 debian-12 Tor[590]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 02:24:53 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:24:53 debian-12 Tor[590]: Signaled readiness to systemd
Jan 16 02:24:42 debian-12 Tor[590]: Starting with guard context "default"
Jan 16 02:24:41 debian-12 Tor[590]: Bootstrapped 0% (starting): Starting
Jan 16 02:24:41 debian-12 Tor[590]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader44 <fingerprint>'
Jan 16 02:24:41 debian-12 Tor[590]: Your Tor server's identity key fingerprint is 'FreedomSpreader44 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 02:24:40 debian-12 Tor[590]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 02:24:40 debian-12 Tor[590]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 02:24:39 debian-12 Tor[590]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 02:24:39 debian-12 Tor[590]: Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:24:39 debian-12 Tor[590]: Opening OR listener on 0.0.0.0:433
Jan 16 02:24:39 debian-12 Tor[590]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay>
Jan 16 02:24:39 debian-12 Tor[590]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:24:39 debian-12 Tor[590]: Read configuration file "/etc/tor/torrc".
Jan 16 02:24:39 debian-12 Tor[590]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:24:39 debian-12 Tor[590]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:24:39 debian-12 Tor[590]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 02:24:39 debian-12 Tor[590]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compat>
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.037 [notice] Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.037 [notice] Opening OR listener on 0.0.0.0:433
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.035 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.034 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:24:39 debian-12 tor[590]: Jan 16 02:24:39.032 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:24:38 debian-12 tor[589]: Configuration was valid
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.956 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.955 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.953 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.953 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.953 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:24:38 debian-12 tor[589]: Jan 16 02:24:38.952 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:24:38 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:24:38 debian-12 systemd[1]: tor@default.service: Consumed 14.413s CPU time.
Jan 16 02:24:38 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:24:38 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 02:24:38 debian-12 Tor[579]: Clean shutdown finished. Exiting.
Jan 16 02:24:09 debian-12 Tor[579]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 02:24:08 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:24:08 debian-12 Tor[579]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 02:22:46 debian-12 Tor[579]: Self-testing indicates your ORPort <IP address>:433 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 02:22:45 debian-12 Tor[579]: Now checking whether IPv4 ORPort <IP address>:433 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 02:22:45 debian-12 Tor[579]: Bootstrapped 100% (done): Done
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 02:22:44 debian-12 Tor[579]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 02:22:44 debian-12 Tor[579]: Opening Control listener on /run/tor/control
Jan 16 02:22:44 debian-12 Tor[579]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 02:22:43 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:22:43 debian-12 Tor[579]: Signaled readiness to systemd
Jan 16 02:22:32 debian-12 Tor[579]: Starting with guard context "default"
Jan 16 02:22:31 debian-12 Tor[579]: Bootstrapped 0% (starting): Starting
Jan 16 02:22:31 debian-12 Tor[579]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <fingerprint>'
Jan 16 02:22:31 debian-12 Tor[579]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 02:22:31 debian-12 Tor[579]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 02:22:31 debian-12 Tor[579]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 02:22:30 debian-12 Tor[579]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 02:22:29 debian-12 Tor[579]: Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:22:29 debian-12 Tor[579]: Opening OR listener on 0.0.0.0:433
Jan 16 02:22:29 debian-12 Tor[579]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay>
Jan 16 02:22:29 debian-12 Tor[579]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:22:29 debian-12 Tor[579]: Read configuration file "/etc/tor/torrc".
Jan 16 02:22:29 debian-12 Tor[579]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:22:29 debian-12 Tor[579]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:22:29 debian-12 Tor[579]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 02:22:29 debian-12 Tor[579]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compat>
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.872 [notice] Opened OR listener connection (ready) on 0.0.0.0:433
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.872 [notice] Opening OR listener on 0.0.0.0:433
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.870 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.870 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:22:29 debian-12 tor[579]: Jan 16 02:22:29.868 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:22:29 debian-12 tor[577]: Configuration was valid
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.806 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.806 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.802 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.802 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.801 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 02:22:29 debian-12 tor[577]: Jan 16 02:22:29.801 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 02:22:29 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:22:29 debian-12 systemd[1]: tor@default.service: Consumed 1min 3.115s CPU time.
Jan 16 02:22:29 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 02:22:29 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 02:22:29 debian-12 Tor[457]: Clean shutdown finished. Exiting.
Jan 16 02:22:00 debian-12 Tor[457]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 02:21:59 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 02:21:59 debian-12 Tor[457]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:55:26 debian-12 Tor[457]: Performing bandwidth self-test...done.
Jan 16 00:50:24 debian-12 Tor[457]: Self-testing indicates your ORPort <IP address>:40195 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:50:22 debian-12 Tor[457]: Now checking whether IPv4 ORPort <IP address>:40195 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 100% (done): Done
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:50:22 debian-12 Tor[457]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:50:22 debian-12 Tor[457]: Opening Control listener on /run/tor/control
Jan 16 00:50:22 debian-12 Tor[457]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:50:20 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:50:20 debian-12 Tor[457]: Signaled readiness to systemd
Jan 16 00:50:10 debian-12 Tor[457]: Starting with guard context "default"
Jan 16 00:50:08 debian-12 Tor[457]: Bootstrapped 0% (starting): Starting
Jan 16 00:50:08 debian-12 Tor[457]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <fingerprint>'
Jan 16 00:50:08 debian-12 Tor[457]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:50:07 debian-12 Tor[457]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:50:07 debian-12 Tor[457]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:50:07 debian-12 Tor[457]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:50:05 debian-12 Tor[457]: Opened OR listener connection (ready) on 0.0.0.0:40195
Jan 16 00:50:05 debian-12 Tor[457]: OR listener listening on port 40195.
Jan 16 00:50:05 debian-12 Tor[457]: Opening OR listener on 0.0.0.0:0
Jan 16 00:50:05 debian-12 Tor[457]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRelay>
Jan 16 00:50:05 debian-12 Tor[457]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:50:05 debian-12 Tor[457]: Read configuration file "/etc/tor/torrc".
Jan 16 00:50:05 debian-12 Tor[457]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:50:05 debian-12 Tor[457]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:50:05 debian-12 Tor[457]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:50:05 debian-12 Tor[457]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compat>
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.540 [notice] Opened OR listener connection (ready) on 0.0.0.0:40195
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.540 [notice] OR listener listening on port 40195.
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.539 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.536 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.536 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.532 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.532 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.532 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:50:05 debian-12 tor[457]: Jan 16 00:50:05.531 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 00:50:05 debian-12 tor[452]: Configuration was valid
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.450 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message>
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.450 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.447 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.447 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.446 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:50:05 debian-12 tor[452]: Jan 16 00:50:05.445 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gli>
Jan 16 00:50:05 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
-- Boot 7eb81984df8f4ae380ca2822182d9a59 --
Jan 16 00:49:36 debian-12 systemd[1]: tor@default.service: Consumed 14.059s CPU time.
Jan 16 00:49:36 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:49:36 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:49:35 debian-12 Tor[2028]: Clean shutdown finished. Exiting.
Jan 16 00:49:06 debian-12 Tor[2028]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:49:05 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:49:05 debian-12 Tor[2028]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:45:53 debian-12 Tor[2028]: Self-testing indicates your ORPort <IP address>:39875 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:45:52 debian-12 Tor[2028]: Now checking whether IPv4 ORPort <IP address>:39875 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:45:52 debian-12 Tor[2028]: Bootstrapped 100% (done): Done
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:45:51 debian-12 Tor[2028]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:45:51 debian-12 Tor[2028]: Opening Control listener on /run/tor/control
Jan 16 00:45:51 debian-12 Tor[2028]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:45:50 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:45:50 debian-12 Tor[2028]: Signaled readiness to systemd
Jan 16 00:45:40 debian-12 Tor[2028]: Starting with guard context "default"
Jan 16 00:45:39 debian-12 Tor[2028]: Bootstrapped 0% (starting): Starting
Jan 16 00:45:39 debian-12 Tor[2028]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <fingerprint>'
Jan 16 00:45:39 debian-12 Tor[2028]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:45:39 debian-12 Tor[2028]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:45:38 debian-12 Tor[2028]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:45:38 debian-12 Tor[2028]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:45:37 debian-12 Tor[2028]: Opened OR listener connection (ready) on 0.0.0.0:39875
Jan 16 00:45:37 debian-12 Tor[2028]: OR listener listening on port 39875.
Jan 16 00:45:37 debian-12 Tor[2028]: Opening OR listener on 0.0.0.0:0
Jan 16 00:45:37 debian-12 Tor[2028]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:45:37 debian-12 Tor[2028]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:45:37 debian-12 Tor[2028]: Read configuration file "/etc/tor/torrc".
Jan 16 00:45:37 debian-12 Tor[2028]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:45:37 debian-12 Tor[2028]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:45:37 debian-12 Tor[2028]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:45:37 debian-12 Tor[2028]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.444 [notice] Opened OR listener connection (ready) on 0.0.0.0:39875
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.444 [notice] OR listener listening on port 39875.
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.444 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.441 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.441 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:45:37 debian-12 tor[2028]: Jan 16 00:45:37.439 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:45:37 debian-12 tor[2027]: Configuration was valid
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.375 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.375 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:45:37 debian-12 tor[2027]: Jan 16 00:45:37.373 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:45:37 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:44:59 debian-12 systemd[1]: tor@default.service: Consumed 14.090s CPU time.
Jan 16 00:44:59 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:44:59 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:44:59 debian-12 Tor[2005]: Clean shutdown finished. Exiting.
Jan 16 00:44:29 debian-12 Tor[2005]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:44:29 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:44:29 debian-12 Tor[2005]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:42:10 debian-12 Tor[2005]: Self-testing indicates your ORPort <IP address>:37083 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:42:09 debian-12 Tor[2005]: Now checking whether IPv4 ORPort <IP address>:37083 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:42:09 debian-12 Tor[2005]: Bootstrapped 100% (done): Done
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:42:08 debian-12 Tor[2005]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:42:08 debian-12 Tor[2005]: Opening Control listener on /run/tor/control
Jan 16 00:42:08 debian-12 Tor[2005]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:42:07 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:42:07 debian-12 Tor[2005]: Signaled readiness to systemd
Jan 16 00:41:57 debian-12 Tor[2005]: Starting with guard context "default"
Jan 16 00:41:56 debian-12 Tor[2005]: Bootstrapped 0% (starting): Starting
Jan 16 00:41:56 debian-12 Tor[2005]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <fingerprint>'
Jan 16 00:41:56 debian-12 Tor[2005]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:41:55 debian-12 Tor[2005]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:41:55 debian-12 Tor[2005]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:41:55 debian-12 Tor[2005]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:41:54 debian-12 Tor[2005]: Opened OR listener connection (ready) on 0.0.0.0:37083
Jan 16 00:41:54 debian-12 Tor[2005]: OR listener listening on port 37083.
Jan 16 00:41:54 debian-12 Tor[2005]: Opening OR listener on 0.0.0.0:0
Jan 16 00:41:54 debian-12 Tor[2005]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:41:54 debian-12 Tor[2005]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:41:54 debian-12 Tor[2005]: Read configuration file "/etc/tor/torrc".
Jan 16 00:41:54 debian-12 Tor[2005]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:41:54 debian-12 Tor[2005]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:41:54 debian-12 Tor[2005]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:41:54 debian-12 Tor[2005]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.261 [notice] Opened OR listener connection (ready) on 0.0.0.0:37083
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.261 [notice] OR listener listening on port 37083.
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.261 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.259 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.258 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:41:54 debian-12 tor[2005]: Jan 16 00:41:54.256 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:41:54 debian-12 tor[2003]: Configuration was valid
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.176 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.175 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:41:54 debian-12 tor[2003]: Jan 16 00:41:54.173 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:41:54 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:41:54 debian-12 systemd[1]: tor@default.service: Consumed 14.462s CPU time.
Jan 16 00:41:54 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:41:54 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:41:53 debian-12 Tor[1992]: Clean shutdown finished. Exiting.
Jan 16 00:41:24 debian-12 Tor[1992]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:41:23 debian-12 Tor[1992]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:41:23 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:40:36 debian-12 Tor[1992]: Performing bandwidth self-test...done.
Jan 16 00:39:37 debian-12 Tor[1992]: Self-testing indicates your ORPort <IP address>:40607 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:39:35 debian-12 Tor[1992]: Now checking whether IPv4 ORPort <IP address>:40607 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 100% (done): Done
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:39:35 debian-12 Tor[1992]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:39:35 debian-12 Tor[1992]: Opening Control listener on /run/tor/control
Jan 16 00:39:35 debian-12 Tor[1992]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:39:34 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:39:34 debian-12 Tor[1992]: Signaled readiness to systemd
Jan 16 00:39:24 debian-12 Tor[1992]: Starting with guard context "default"
Jan 16 00:39:23 debian-12 Tor[1992]: Bootstrapped 0% (starting): Starting
Jan 16 00:39:23 debian-12 Tor[1992]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <fingerprint>'
Jan 16 00:39:23 debian-12 Tor[1992]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:39:22 debian-12 Tor[1992]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:39:21 debian-12 Tor[1992]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:39:21 debian-12 Tor[1992]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:39:20 debian-12 Tor[1992]: Opened OR listener connection (ready) on 0.0.0.0:40607
Jan 16 00:39:20 debian-12 Tor[1992]: OR listener listening on port 40607.
Jan 16 00:39:20 debian-12 Tor[1992]: Opening OR listener on 0.0.0.0:0
Jan 16 00:39:20 debian-12 Tor[1992]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:39:20 debian-12 Tor[1992]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:39:20 debian-12 Tor[1992]: Read configuration file "/etc/tor/torrc".
Jan 16 00:39:20 debian-12 Tor[1992]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:39:20 debian-12 Tor[1992]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:39:20 debian-12 Tor[1992]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:39:20 debian-12 Tor[1992]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.747 [notice] Opened OR listener connection (ready) on 0.0.0.0:40607
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.747 [notice] OR listener listening on port 40607.
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.747 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.746 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.746 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:39:20 debian-12 tor[1992]: Jan 16 00:39:20.744 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:39:20 debian-12 tor[1991]: Configuration was valid
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.693 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.693 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:39:20 debian-12 tor[1991]: Jan 16 00:39:20.691 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:39:20 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:39:20 debian-12 systemd[1]: tor@default.service: Consumed 15.561s CPU time.
Jan 16 00:39:20 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:39:20 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:39:20 debian-12 Tor[1975]: Clean shutdown finished. Exiting.
Jan 16 00:38:50 debian-12 Tor[1975]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:38:50 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:38:50 debian-12 Tor[1975]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:32:57 debian-12 Tor[1975]: Self-testing indicates your ORPort <IP address>:38995 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:32:56 debian-12 Tor[1975]: Now checking whether IPv4 ORPort <IP address>:38995 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:32:56 debian-12 Tor[1975]: Bootstrapped 100% (done): Done
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:32:55 debian-12 Tor[1975]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:32:55 debian-12 Tor[1975]: Opening Control listener on /run/tor/control
Jan 16 00:32:55 debian-12 Tor[1975]: Opened Socks listener connection (ready) on /run/tor/socks
Jan 16 00:32:55 debian-12 Tor[1975]: Opening Socks listener on /run/tor/socks
Jan 16 00:32:55 debian-12 Tor[1975]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:32:54 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:32:54 debian-12 Tor[1975]: Signaled readiness to systemd
Jan 16 00:32:43 debian-12 Tor[1975]: Starting with guard context "default"
Jan 16 00:32:42 debian-12 Tor[1975]: Bootstrapped 0% (starting): Starting
Jan 16 00:32:42 debian-12 Tor[1975]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <fingerprint>'
Jan 16 00:32:42 debian-12 Tor[1975]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:32:41 debian-12 Tor[1975]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:32:41 debian-12 Tor[1975]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:32:41 debian-12 Tor[1975]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:32:40 debian-12 Tor[1975]: Opened OR listener connection (ready) on 0.0.0.0:38995
Jan 16 00:32:40 debian-12 Tor[1975]: OR listener listening on port 38995.
Jan 16 00:32:40 debian-12 Tor[1975]: Opening OR listener on 0.0.0.0:0
Jan 16 00:32:40 debian-12 Tor[1975]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 Tor[1975]: Opening Socks listener on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 Tor[1975]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:32:40 debian-12 Tor[1975]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:32:40 debian-12 Tor[1975]: Read configuration file "/etc/tor/torrc".
Jan 16 00:32:40 debian-12 Tor[1975]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:32:40 debian-12 Tor[1975]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:32:40 debian-12 Tor[1975]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:32:40 debian-12 Tor[1975]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opened OR listener connection (ready) on 0.0.0.0:38995
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] OR listener listening on port 38995.
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opening OR listener on 0.0.0.0:0
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.218 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.215 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.215 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:32:40 debian-12 tor[1975]: Jan 16 00:32:40.212 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:32:40 debian-12 tor[1974]: Configuration was valid
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.126 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.126 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:32:40 debian-12 tor[1974]: Jan 16 00:32:40.122 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:32:40 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:32:40 debian-12 systemd[1]: tor@default.service: Consumed 15.079s CPU time.
Jan 16 00:32:40 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:32:40 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:32:39 debian-12 Tor[1961]: Clean shutdown finished. Exiting.
Jan 16 00:32:09 debian-12 Tor[1961]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:32:09 debian-12 Tor[1961]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:32:09 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:30:33 debian-12 Tor[1961]: Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:30:32 debian-12 Tor[1961]: Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 100% (done): Done
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:30:32 debian-12 Tor[1961]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:30:31 debian-12 Tor[1961]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:30:31 debian-12 Tor[1961]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:30:31 debian-12 Tor[1961]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:30:31 debian-12 Tor[1961]: Opening Control listener on /run/tor/control
Jan 16 00:30:31 debian-12 Tor[1961]: Opened Socks listener connection (ready) on /run/tor/socks
Jan 16 00:30:31 debian-12 Tor[1961]: Opening Socks listener on /run/tor/socks
Jan 16 00:30:31 debian-12 Tor[1961]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:30:30 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:30:30 debian-12 Tor[1961]: Signaled readiness to systemd
Jan 16 00:30:19 debian-12 Tor[1961]: Starting with guard context "default"
Jan 16 00:30:18 debian-12 Tor[1961]: Bootstrapped 0% (starting): Starting
Jan 16 00:30:18 debian-12 Tor[1961]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:30:18 debian-12 Tor[1961]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:30:18 debian-12 Tor[1961]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:30:17 debian-12 Tor[1961]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:30:17 debian-12 Tor[1961]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:30:16 debian-12 Tor[1961]: Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:30:16 debian-12 Tor[1961]: Opening OR listener on 0.0.0.0:443
Jan 16 00:30:16 debian-12 Tor[1961]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 Tor[1961]: Opening Socks listener on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 Tor[1961]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:30:16 debian-12 Tor[1961]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:30:16 debian-12 Tor[1961]: Read configuration file "/etc/tor/torrc".
Jan 16 00:30:16 debian-12 Tor[1961]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:30:16 debian-12 Tor[1961]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:30:16 debian-12 Tor[1961]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:30:16 debian-12 Tor[1961]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opening OR listener on 0.0.0.0:443
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.691 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.688 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.688 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:30:16 debian-12 tor[1961]: Jan 16 00:30:16.684 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:30:16 debian-12 tor[1960]: Configuration was valid
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.596 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.596 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:30:16 debian-12 tor[1960]: Jan 16 00:30:16.593 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:30:16 debian-12 systemd[1]: Starting tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:30:16 debian-12 systemd[1]: tor@default.service: Consumed 14.491s CPU time.
Jan 16 00:30:16 debian-12 systemd[1]: Stopped tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:30:16 debian-12 systemd[1]: tor@default.service: Deactivated successfully.
Jan 16 00:30:16 debian-12 Tor[1948]: Clean shutdown finished. Exiting.
Jan 16 00:29:47 debian-12 Tor[1948]: Delaying directory fetches: We are hibernating or shutting down.
Jan 16 00:29:46 debian-12 systemd[1]: Stopping tor@default.service - Anonymizing overlay network for TCP...
Jan 16 00:29:46 debian-12 Tor[1948]: Interrupt: we have stopped accepting new connections, and will shut down in 30 seconds. Interrupt again to exit now.
Jan 16 00:27:18 debian-12 Tor[1948]: Self-testing indicates your ORPort <IP address>:443 is reachable from the outside. Excellent. Publishing server descriptor.
Jan 16 00:27:16 debian-12 Tor[1948]: Now checking whether IPv4 ORPort <IP address>:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 100% (done): Done
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 14% (handshake): Handshaking with a relay
Jan 16 00:27:16 debian-12 Tor[1948]: Bootstrapped 10% (conn_done): Connected to a relay
Jan 16 00:27:16 debian-12 Tor[1948]: Unable to find IPv6 address for ORPort 443. You might want to specify IPv4Only to it or set an explicit address or set Address.
Jan 16 00:27:16 debian-12 Tor[1948]: Opened Control listener connection (ready) on /run/tor/control
Jan 16 00:27:16 debian-12 Tor[1948]: Opening Control listener on /run/tor/control
Jan 16 00:27:16 debian-12 Tor[1948]: Opened Socks listener connection (ready) on /run/tor/socks
Jan 16 00:27:16 debian-12 Tor[1948]: Opening Socks listener on /run/tor/socks
Jan 16 00:27:15 debian-12 Tor[1948]: Bootstrapped 5% (conn): Connecting to a relay
Jan 16 00:27:14 debian-12 systemd[1]: Started tor@default.service - Anonymizing overlay network for TCP.
Jan 16 00:27:14 debian-12 Tor[1948]: Signaled readiness to systemd
Jan 16 00:27:05 debian-12 Tor[1948]: Starting with guard context "default"
Jan 16 00:27:04 debian-12 Tor[1948]: Bootstrapped 0% (starting): Starting
Jan 16 00:27:04 debian-12 Tor[1948]: Your Tor server's identity key ed25519 fingerprint is 'FreedomSpreader444 <identity key>'
Jan 16 00:27:04 debian-12 Tor[1948]: Your Tor server's identity key fingerprint is 'FreedomSpreader444 04B1E9882FF9CC529959F081AD5E4F1958A89890'
Jan 16 00:27:03 debian-12 Tor[1948]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
Jan 16 00:27:03 debian-12 Tor[1948]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 16 00:27:02 debian-12 Tor[1948]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 16 00:27:01 debian-12 Tor[1948]: Opened OR listener connection (ready) on [::]:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opening OR listener on [::]:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opening OR listener on 0.0.0.0:443
Jan 16 00:27:01 debian-12 Tor[1948]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 Tor[1948]: Opening Socks listener on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 Tor[1948]: By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this message in the future, set ExitRela>
Jan 16 00:27:01 debian-12 Tor[1948]: Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:27:01 debian-12 Tor[1948]: Read configuration file "/etc/tor/torrc".
Jan 16 00:27:01 debian-12 Tor[1948]: Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:27:01 debian-12 Tor[1948]: Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:27:01 debian-12 Tor[1948]: Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Glibc 2.36 as libc.
Jan 16 00:27:01 debian-12 Tor[1948]: We compiled with OpenSSL 300000e0: OpenSSL 3.0.14 4 Jun 2024 and we are running with OpenSSL 300000f0: 3.0.15. These two versions should be binary compa>
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.821 [notice] Opened OR listener connection (ready) on [::]:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.821 [notice] Opening OR listener on [::]:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opened OR listener connection (ready) on 0.0.0.0:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opening OR listener on 0.0.0.0:443
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.820 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.818 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.818 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:27:01 debian-12 tor[1948]: Jan 16 00:27:01.815 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:27:01 debian-12 tor[1947]: Configuration was valid
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.745 [notice] By default, Tor does not run as an exit relay. If you want to be an exit relay, set ExitRelay to 1. To suppress this messag>
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.745 [notice] Based on detected system memory, MaxMemInQueues is set to 720 MB. You can override this by setting MaxMemInQueues by hand.
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.742 [notice] Read configuration file "/etc/tor/torrc".
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.742 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.742 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Jan 16 00:27:01 debian-12 tor[1947]: Jan 16 00:27:01.742 [notice] Tor 0.4.8.13 running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.15, Zlib 1.2.13, Liblzma 5.4.1, Libzstd 1.5.4 and Gl>
Jan 16 00:27:01 debian-12 sy

This topic was automatically closed 24 hours after the last reply. New replies are no longer allowed.