Tor error for connecting

tor: 0.4.8.10-1~d12.bookworm+1
error:
Problem bootstrapping. Stuck at 5% (conn): Connecting to a relay. (Connection timed out; TIMEOUT; count 3641; recommendation warn; ho>
Tor[302976]: 3640 connections have failed:
Tor[302976]: 3640 connections died in state connect()ing with SSL state (No SSL object)
Tor[302976]: Failed to find node for hop #1 of our path. Discarding this circuit.
Tor[302976]: Problem bootstrapping. Stuck at 5% (conn): Connecting to a relay. (Connection timed out; TIMEOUT; count 3642; recommendation warn; ho>
Tor[302976]: 3641 connections have failed:
Tor[302976]: 3641 connections died in state connect()ing with SSL state (No SSL object)

10:19:31 [NYX_NOTICE] Tor control port closed
│ 10:19:02 [NOTICE] Delaying directory fetches: We are hibernating or shutting down.
│ 10:19:01 [WARN] Managed proxy “/usr/bin/snowflake-client” process terminated with status code 2
│ 10:19:01 [NOTICE] Interrupt: we have stopped accepting new connections, and will shut down in 30
│ seconds. Interrupt again to exit now.
│ 10:17:41 [WARN] 310 connections died in state connect()ing with SSL state (No SSL object)
│ 10:17:41 [WARN] 310 connections have failed:
│ 10:17:41 [WARN] Problem bootstrapping. Stuck at 5% (conn): Connecting to a relay. (Connection timed
│ out; TIMEOUT; count 311; recommendation warn; host 1A3623FBE5B28D4F722906767FFA8F0AB7ECCC1E at
│ 31.133.0.141:443) [189 duplicates hidden]
│ 10:17:40 [WARN] 309 connections died in state connect()ing with SSL state (No SSL object)
│ 10:17:40 [WARN] 309 connections have failed:
│ 10:17:40 [WARN] 308 connections died in state connect()ing with SSL state (No SSL object)
│ 10:17:40 [WARN] 308 connections have failed:

54:20 [NOTICE] Application request when we haven’t used client functionality lately. Optimistically
│ trying directory fetches again. [62 duplicates hidden]

15:19:31 [NYX_NOTICE] Tor control port closed
│ 15:19:02 [NOTICE] Delaying directory fetches: We are hibernating or shutting down.
│ 15:19:01 [WARN] Managed proxy “/usr/bin/snowflake-client” process terminated with status code 2
│ 15:19:01 [NOTICE] Interrupt: we have stopped accepting new connections, and will shut down in 30
│ seconds. Interrupt again to exit now.
│ 15:05:31 [NOTICE] Unable to find IPv4 address for ORPort 31241. You might want to specify IPv6Only to
│ it or set an explicit address or set Address. [120 similar message(s) suppressed in last 3600
│ seconds] [1 duplicate hidden]
│ 15:05:31 [WARN] TLS error: bad value (in SSL routines:(null):—) [1 duplicate hidden]
│ 15:05:31 [WARN] TLS error: invalid command (in SSL routines:(null):—) [1 duplicate hidden]
│ 15:05:31 [WARN] Unhandled OpenSSL errors found at …/src/lib/tls/tortls_openssl.c:333:
│ 15:05:31 [WARN] Unhandled OpenSSL errors found at …/src/lib/tls/tortls.c:190:
│ 15:03:47 [WARN] 561 connections died in state connect()ing with SSL state (No SSL object)
│ 15:03:47 [WARN] 561 connections have failed:
│ 15:03:47 [WARN] Problem bootstrapping. Stuck at 5% (conn): Connecting to a relay. (Connection timed
│ out; TIMEOUT; count 562; recommendation warn; host F2044413DAC2E02E3D6BCF4735A19BCA1DE97281 at
│ 131.188.40.189:443) [319 duplicates hidden]
│ 15:03:15 [WARN] 560 connections died in state connect()ing with SSL state (No SSL object)

Could you clarify what you are trying to do, and share your torrc?
Running snowflake-client and binding an ORPort aren’t things you should be doing at the same time.

i’m disabled snowflake-client,
error:
17:57:13 [WARN] 26 connections died in state connect()ing with SSL
│ state (No SSL object)
│ 17:57:13 [WARN] 26 connections have failed:
│ 17:57:13 [WARN] Problem bootstrapping. Stuck at 5% (conn):
│ Connecting to a relay. (Connection timed out; TIMEOUT; count 27;
─┘ recommendation warn; host

in to wall for china

## Configuration file for a typical Tor user
## Last updated 22 September 2015 for Tor 0.2.7.3-alpha.
## (may or may not work for much older or much newer versions of Tor.)
##
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
##
## See 'man tor', or https://www.torproject.org/docs/tor-manual.html,
## for more options you can use in this file.
##
## Tor will look for this file in various places based on your platform:
## https://www.torproject.org/docs/faq#torrc

## Tor opens a SOCKS proxy on port 9050 by default -- even if you don't
## configure one below. Set "SOCKSPort 0" if you plan to run Tor only
## as a relay, and not make any local application connections yourself.
#SOCKSPort 9050 # Default: Bind to localhost:9050 for local connections.
#SOCKSPort 192.168.0.1:9100 # Bind to this address:port too.

## Entry policies to allow/deny SOCKS requests based on IP address.
## First entry that matches wins. If no SOCKSPolicy is set, we accept
## all (and only) requests that reach a SOCKSPort. Untrusted users who
## can access your SOCKSPort may be able to learn about the connections
## you make.
#SOCKSPolicy accept 192.168.0.0/16
#SOCKSPolicy accept6 FC00::/7
#SOCKSPolicy reject *

## Logs go to stdout at level "notice" unless redirected by something
## else, like one of the below lines. You can have as many Log lines as
## you want.
##
## We advise using "notice" in most cases, since anything more verbose
## may provide sensitive information to an attacker who obtains the logs.
##
## Send all messages of level 'notice' or higher to /var/log/tor/notices.log
#Log notice file /var/log/tor/notices.log
## Send every possible message to /var/log/tor/debug.log
#Log debug file /var/log/tor/debug.log
## Use the system log instead of Tor's logfiles
#Log notice syslog
## To send all messages to stderr:
#Log debug stderr

## Uncomment this to start the process in the background... or use
## --runasdaemon 1 on the command line. This is ignored on Windows;
## see the FAQ entry if you want Tor to run as an NT service.
#RunAsDaemon 1

## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
DataDirectory /var/lib/tor
DirReqStatistics 0

## The port on which Tor will listen for local connections from Tor
## controller applications, as documented in control-spec.txt.
ControlPort 40287
## If you enable the controlport, be sure to enable one of these
## authentication methods, to prevent attackers from accessing it.
#HashedControlPassword 16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053EC4C
#CookieAuthentication 1

############### This section is just for location-hidden services ###

## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.

#HiddenServiceDir /var/lib/tor/hidden_service/
#HiddenServicePort 80 127.0.0.1:80

#HiddenServiceDir /var/lib/tor/other_hidden_service/
#HiddenServicePort 80 127.0.0.1:80
#HiddenServicePort 22 127.0.0.1:22

################ This section is just for relays #####################
#
## See https://www.torproject.org/docs/tor-doc-relay for details.

## Required: what port to advertise for incoming Tor connections.
#ORPort 9001
## If you want to listen on a port other than the one advertised in
## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as
## follows.  You'll need to do ipchains or other port forwarding
## yourself to make this work.
#ORPort 443 NoListen
#ORPort 127.0.0.1:9090 NoAdvertise

## The IP address or full DNS name for incoming connections to your
## relay. Leave commented out and Tor will guess.
#Address noname.example.com

## If you have multiple network interfaces, you can specify one for
## outgoing traffic to use.
# OutboundBindAddress 10.0.0.5

## A handle for your relay, so people don't have to refer to it by key.
## Nicknames must be between 1 and 19 characters inclusive, and must
## contain only the characters [a-zA-Z0-9].
#Nickname ididnteditheconfig

## Define these to limit how much relayed traffic you will allow. Your
## own traffic is still unthrottled. Note that RelayBandwidthRate must
## be at least 75 kilobytes per second.
## Note that units for these config options are bytes (per second), not
## bits (per second), and that prefixes are binary prefixes, i.e. 2^10,
## 2^20, etc.
#RelayBandwidthRate 100 KBytes  # Throttle traffic to 100KB/s (800Kbps)
#RelayBandwidthBurst 200 KBytes # But allow bursts up to 200KB (1600Kb)

## Use these to restrict the maximum traffic per day, week, or month.
## Note that this threshold applies separately to sent and received bytes,
## not to their sum: setting "40 GB" may allow up to 80 GB total before
## hibernating.
##
## Set a maximum of 40 gigabytes each way per period.
#AccountingMax 40 GBytes
## Each period starts daily at midnight (AccountingMax is per day)
#AccountingStart day 00:00
## Each period starts on the 3rd of the month at 15:00 (AccountingMax
## is per month)
#AccountingStart month 3 15:00

## Administrative contact information for this relay or bridge. This line
## can be used to contact you if your relay or bridge is misconfigured or
## something else goes wrong. Note that we archive and publish all
## descriptors containing these lines and that Google indexes them, so
## spammers might also collect them. You may want to obscure the fact that
## it's an email address and/or generate a new address for this purpose.
#ContactInfo Random Person <nobody AT example dot com>
## You might also include your PGP or GPG fingerprint if you have one:
#ContactInfo 0xFFFFFFFF Random Person <nobody AT example dot com>

## Uncomment this to mirror directory information for others. Please do
## if you have enough bandwidth.
#DirPort 9030 # what port to advertise for directory connections
## If you want to listen on a port other than the one advertised in
## DirPort (e.g. to advertise 80 but bind to 9091), you can do it as
## follows.  below too. You'll need to do ipchains or other port
## forwarding yourself to make this work.
#DirPort 9091 NoListen
DirPort 15304 NoListen
DirPort 127.0.0.1:13937 NoAdvertise
DirPort [::1]:13937 NoAdvertise
## Uncomment to return an arbitrary blob of html on your DirPort. Now you
## can explain what Tor is if anybody wonders why your IP address is
## contacting them. See contrib/tor-exit-notice.html in Tor's source
## distribution for a sample.
DirPortFrontPage /etc/tor/tor-exit-notice.html

## Uncomment this if you run more than one Tor relay, and add the identity
## key fingerprint of each Tor relay you control, even if they're on
## different networks. You declare it here so Tor clients can avoid
## using more than one of your relays in a single circuit. See
## https://www.torproject.org/docs/faq#MultipleRelays
## However, you should never include a bridge's fingerprint here, as it would
## break its concealability and potentially reveal its IP/TCP address.
#MyFamily $keyid,$keyid,...

## A comma-separated list of exit policies. They're considered first
## to last, and the first match wins.
##
## If you want to allow the same ports on IPv4 and IPv6, write your rules
## using accept/reject *. If you want to allow different ports on IPv4 and
## IPv6, write your IPv6 rules using accept6/reject6 *6, and your IPv4 rules
## using accept/reject *4.
##
## If you want to _replace_ the default exit policy, end this with either a
## reject *:* or an accept *:*. Otherwise, you're _augmenting_ (prepending to)
## the default exit policy. Leave commented to just use the default, which is
## described in the man page or at
## https://www.torproject.org/documentation.html
##
## Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses
## for issues you might encounter if you use the default exit policy.
##
## If certain IPs and ports are blocked externally, e.g. by your firewall,
## you should update your exit policy to reflect this -- otherwise Tor
## users will be told that those destinations are down.
##
## For security, by default Tor rejects connections to private (local)
## networks, including to the configured primary public IPv4 and IPv6 addresses,
## and any public IPv4 and IPv6 addresses on any interface on the relay.
## See the man page entry for ExitPolicyRejectPrivate if you want to allow
## "exit enclaving".
##
#ExitPolicy accept *:6660-6667,reject *:* # allow irc ports on IPv4 and IPv6 but no more
#ExitPolicy accept *:119 # accept nntp ports on IPv4 and IPv6 as well as default exit policy
#ExitPolicy accept *4:119 # accept nntp ports on IPv4 only as well as default exit policy
#ExitPolicy accept6 *6:119 # accept nntp ports on IPv6 only as well as default exit policy
#ExitPolicy reject *:* # no exits allowed

## Bridge relays (or "bridges") are Tor relays that aren't listed in the
## main directory. Since there is no complete public list of them, even an
## ISP that filters connections to all the known Tor relays probably
## won't be able to block all the bridges. Also, websites won't treat you
## differently because they won't know you're running Tor. If you can
## be a real relay, please do; but if not, be a bridge!
#BridgeRelay 1
## By default, Tor will advertise your bridge to users through various
## mechanisms like https://bridges.torproject.org/. If you want to run
## a private bridge, for example because you'll give out your bridge
## address manually to your friends, uncomment this line:
#PublishServerDescriptor 0
DNSPort 9053
 AutomapHostsOnResolve 1
 AutomapHostsSuffixes .exit,.onion
#ClientTransportPlugin meek exec /usr/bin/meek-client --url=https://www.taobao.com/ --log meek-client.log
#    ClientTransportPlugin meek exec /usr/bin/meek-client
#     Bridge meek 0.0.2.0:2 97700DFE9F483596DDA6264C4D7DF7641E1E39CE url=https://meek.azureedge.net/ front=ajax.aspnetcdn.com
#ServerTransportPlugin meek exec /usr/bin/meek-server
## fteproxy configuration
#ClientTransportPlugin fte exec /usr/bin/fteproxyx --managed
#
### obfs4proxy configuration
#[warn] Could not launch managed proxy executable at '/usr/bin/obfs4proxy' ('Operation not permitted').
#/usr/bin/obfs4proxy PUx,
#/etc/apparmor.d/abstractions/tor
#/usr/bin/obfs4proxy ix,
#$ sudo apparmor_parser -r -v /etc/apparmor.d/system_tor
##### ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy
ClientTransportPlugin meek_lite,obfs2,obfs3,obfs4,scramblesuit exec /usr/bin/obfs4proxy
ClientTransportPlugin webtunnel exec /usr/bin/webtunnel-client

## snowflake configuration
ClientTransportPlugin snowflake exec /usr/bin/snowflake-client -url https://snowflake-broker.torproject.net.global.prod.fastly.net/ -front cdn.sstatic.net -ice stun:stun.l.google.com:19302,stun:stun.voip.blackberry.com:3478,stun:stun.altar.com.pl:3478,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.sonetel.net:3478,stun:stun.stunprotocol.org:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478
Bridge snowflake 192.0.2.3:80 2B280B23E1107BB62ABFC40DDCC8824814F80A72 fingerprint=2B280B23E1107BB62ABFC40DDCC8824814F80A72 url=https://snowflake-broker.torproject.net.global.prod.fastly.net/ front=cdn.sstatic.net ice=stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478 utls-imitate=hellorandomizedalpn
Bridge snowflake 192.0.2.4:80 8838024498816A039FCBBAB14E6F40A0843051FA fingerprint=8838024498816A039FCBBAB14E6F40A0843051FA url=https://snowflake-broker.torproject.net.global.prod.fastly.net/ front=cdn.sstatic.net ice=stun:stun.l.google.com:19302,stun:stun.antisip.com:3478,stun:stun.bluesip.net:3478,stun:stun.dus.net:3478,stun:stun.epygi.com:3478,stun:stun.sonetel.net:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.voys.nl:3478 utls-imitate=hellorandomizedalpn
Bridge snowflake 192.0.2.3:1 2B280B23E1107BB62ABFC40DDCC8824814F80A72
Bridge webtunnel [2001:db8:9443:367a:3276:1e74:91c3:7a5a]:443 54BF1146B161573185FBA0299B0DC3A8F7D08080 url=https://d3pyjtpvxs6z0u.cloudfront.net/Exei6xoh1aev8fiethee ver=0.0.1
Bridge webtunnel [2001:db8:a467:d527:8b43:36b5:87f4:be9b]:443 8DDA37008209F753913E87C9F62900CAF27A617A url=https://frontierfliers.shop/wXJVKHm813YwEaH1beTs ver=0.0.1
Bridge webtunnel [2001:db8:a62f:3205:a2b8:80f2:8491:9497]:443 CDCF334F257ACAD04A2C6CD9725B7FC686160912 url=https://meskio.net/eCDFZe3boSv+b2iqHiaY4ZgPxXBc ver=0.0.1
Bridge webtunnel [2001:db8:3d87:58ab:4ec3:21ba:913f:99d8]:443 E4B91C347D685E929C1B7CE84CC27EB073127EA6 url=https://borntec.autos/poh8aiteaqu6oophaiXo ver=0.0.1
Bridge obfs4 [2a03:b0c0:3:d0::1370:7001]:32954 B98B6AFF6E5E0B846A7ED9DE9B9432AFC27E8D93 cert=DzuwlTttqnLYNiiKP2OIl+2DVCTv1NlgwazL6vzfPI7sL5GgdNRmePJFDDGVUdMDwC7oJg iat-mode=0
Bridge obfs4 65.108.182.58:8429 6C8264BD4C03CC2FAC80B7C73D2D76D44AB5BB96 cert=ObtoZ3SurzSYEykD3OuHy9RwZgcUukHdCMj1N8t3zhxPsYg8dv91JzSUc6Rr0ma/z4TsNw iat-mode=0
Bridge obfs4 98.109.28.209:9091 5D8B14B27EEFBEADD7F9074462A72C3BAE9B4DBA cert=/7CtW1iuTu+W8wCVT8op1Hjppr1MoVE+W71jYSqu0p8uh2Qp11zFHgiYLyJ08WitjEh7dw iat-mode=0
Bridge obfs4 207.172.185.193:22223 F34AC0CDBC06918E54292A474578C99834A58893 cert=MjqosoyVylLQuLo4LH+eQ5hS7Z44s2CaMfQbIjJtn4bGRnvLv8ldSvSED5JpvWSxm09XXg iat-mode=0
Bridge obfs4 68.183.130.144:443 B010467EF245A2A0510BDA69EB387F9EB48A62BE cert=Mpsj7dp/caXvDcZS33hdKiGM4twgXEprmO/NPJAiawZZDgsxLy7EefCWx0YcZeKeVKw2Aw iat-mode=0
Bridge obfs4 195.15.243.212:3785 01A0C521775D042472D0FC5F6A14430B8AA2EE08 cert=xiLkxosrzh0SE0sAZdavQgecNrxHefFVTlSH7Tg37gkfJfAq1GZCoonIcQiQuU2BfFE4ag iat-mode=0
Bridge obfs4 195.15.243.103:3785 E102004D130241E5C0D46C7E3D049413087265E7 cert=VgPBLrGxnGUAHd9yVsiIL7b1B2fM6FW6CiKzySN7+auze75fgesLCXROfB2WYUA94F6uRw iat-mode=0
Bridge obfs4 89.58.48.49:1312 B955F0A232152B2B09BC41C1AB55CC5F9234B915 cert=RITDHdwFfyU9iHBpOFQfGj8IbWynJDEXQ2A7KCA7EYoUTF0rZ/1ESQbCak8Kc/UuXjGhVA iat-mode=0
Bridge obfs4 138.201.126.116:19443 A00AAEDBBFF21FD1496523AF25C79460A02BE88D cert=+/dNcl2PtaS9ZU5Ldy3BUfhLkXZ9YonvtSfOywpKmayAp98INcbWrYuT6Ol5KMxioGKdEg iat-mode=0
Bridge obfs4 46.226.105.182:3785 7F9D25E5515D0C8C2A6B0995CFC65CFE77303B9F cert=y5Ev1p/hH0hRO7jQAiMIH+z6jHTKSpnngndz7shZ5nDwto81txViGyLB4Rg7EsnlRNwDPw iat-mode=0
Bridge obfs4 [2001:19f0:4401:87c:5400:3ff:feb7:8cfc]:4444 55346F385B6FB7069D1588CE842DBE88F90F90C5 cert=fbtptOz8dA1Sz6Fl4i0k8KNqBVt8ueGmBHUBixB1/0QCyxwct9w4TwyXJe9kjwQCeR9SVw iat-mode=0
Bridge obfs4 [2a02:180:6:1::4ffc]:4444 0E6683151788FF3D971B9D4FCD11C5984B1D05FE cert=HqzDz8I7XoMKnrF7YF25msh3g4r+pdoNFl8ogGHiolBEW7k+S0+NzUdUWYeOgX1C88FZZQ iat-mode=0
Bridge obfs4 72.65.246.86:19002 649B458222B1DB29DD1CFF0BF84DBD46019E260F cert=5JhfiNXzWL0gafmi6rFMtUo2Vb4MxN7ih7pNij6vlOhRvbh//rD57eDI4QPdUXaR6ZqSJA iat-mode=0
Bridge obfs4 157.90.179.134:3306 35B1F1F6F1632381AFE5C7CAC4C1754AC361B036 cert=iN8IHZk2vFGuJY993wCYyUnSt2Y5WNks4HdWpU+mo0HNS9VeDFkhjlVHHQ/ll0sBlRw/KA iat-mode=0
Bridge obfs4 94.142.246.132:8088 135C158527AA9FE9A2F26EC515EB6999D813D347 cert=wTUz0/5FhAZRkitil5MprGbSF3JzjxjxI1kAmxAdSeDy98NgcLr11f/qUXWDC76Y97RiSg iat-mode=0
Bridge obfs4 185.177.207.225:11225 AB8AB7D76BB5F553CE79E5FA863D33E4C8C2E953 cert=5CVS5fZv7g09EBOXYScRqKxEYdrjfkVSSBtbdO9UWJDE3y7BHhT19iR87pnzB1DLy87eTw iat-mode=0
Bridge obfs4 185.177.207.13:22662 928C1E4289A01F34C8FB423FC32C0E77EE0F8736 cert=p9L6+25s8bnfkye1ZxFeAE4mAGY7DH4Gaj7dxngIIzP9BtqrHHwZXdjMK0RVIQ34C7aqZw iat-mode=2
Bridge obfs4 78.135.110.9:50006 FB4F10663CFB7692DEAD7F1827AEF411CF39D6EB cert=Z4n9Wo1eW4mujJB5e2gZIJRC5mtUVuv2x+BsyaQJEpv8SRhhnc5W9WkSef/EgxXkv0VuQA iat-mode=0
Bridge obfs4 207.181.229.55:40132 37FE8D782F5DD2BAEEDAAB8257B701344676B6DD cert=f5Hbfn3ToMzH170cV8DfLly3vRynveidfOfDcbradIDtbLDX15V2yQ8eEH2CPKQJmQR2Hg iat-mode=0
Bridge obfs4 185.177.207.115:12346 EA8C4974A620FB439469029F7A4D2DF9429EC5F6 cert=p9L6+25s8bnfkye1ZxFeAE4mAGY7DH4Gaj7dxngIIzP9BtqrHHwZXdjMK0RVIQ34C7aqZw iat-mode=2
Bridge obfs4 68.63.215.60:9235 53417D7BE0153BD7DC95B55F6808B9B75D6285E8 cert=fQ8xXr3VWyBt06y2E/THDI3t04hEEOyENgVztMaGW3N22wYqA/MCBnPVBgGk182lzqnIUA iat-mode=0
Bridge obfs4 31.13.195.26:46788 FE9ACB2511D606BAE9BFCF01C5A0FE27257BB4EA cert=OSdYQ1ZkzVbTW1nf7FeI/HWl6zN1WoNLz0BkWMmgeAuqvGQdzzAi1eBxUfi0olKLv7jyAA iat-mode=0
Bridge obfs4 223.205.107.124:19050 FF1E3139F51126219A8DC93E1AF65DEE3173E8A0 cert=hFsKmZUWrIGME5AEl56yVSJTWpWvgrJ4EjRPauzYROMshgS8oahPfuI0WgCem5RjF7aIEQ iat-mode=0
Bridge obfs4 165.227.225.46:8060 E08E08BDD944C52080CBA44851F8D703BA8EC7DF cert=d9/EHfKcMdRYGcWt4/ktxSDHQxuEo2XR/XpTUKyUheizOhjLv8oL5aOnQP3dcWjtFQWBHA iat-mode=0
Bridge obfs4 194.147.115.99:46436 5F09A34C87BD2C581E08C7AF752D71ED0AB12AA8 cert=oFPLbjhRmL2umTU/ZoFDx6v1XriwLvm9AK4TQg/ORI57Onq4K33wpPlEcp6XnsE+VtbjfQ iat-mode=0
Bridge obfs4 5.252.176.61:9418 3E61130100AD827AB9CB33DAC052D9BC49A39509 cert=/aMyBPnKbQFISithD3i1KHUdpWeMpWG3SvUpq1YWCf2EQohFxQfw+646gW1knm4BI/DLRA iat-mode=0
Bridge obfs4 70.34.213.156:12345 BC1C79ABBAE085D305346E7A2B0E838953B4B4D3 cert=3Sk4uA3/NiAsn4ObOUzjIzARclGmkiEUrku8o8bkq4ZL+dek9uLj/d5LZ5nAXT6L9S0CZA iat-mode=0
Bridge obfs4 130.61.183.177:4096 F9EB0AB3306C4ECDA759ECAD479C28D4EA387C22 cert=HMb1IFlQTZ+pMM9aQ/JFxgJEs3Cvx2c/N71hywtdX0mU/G/A7KTPdfYyAe+W9a4Jkw6rNQ iat-mode=0
Bridge obfs4 132.145.63.40:47347 5C72EEEE587AB1C7021A78707DAB80427F7A9B43 cert=HAZq1DmA4kR1/IFy1TBeSd67BNQI4SDur+U3zxun+G7HCWJ+x66eUyM6/sariPQYDJ9aIw iat-mode=0
Bridge obfs4 46.226.105.182:3785 7F9D25E5515D0C8C2A6B0995CFC65CFE77303B9F cert=y5Ev1p/hH0hRO7jQAiMIH+z6jHTKSpnngndz7shZ5nDwto81txViGyLB4Rg7EsnlRNwDPw iat-mode=0
Bridge obfs4 195.15.243.103:3785 E102004D130241E5C0D46C7E3D049413087265E7 cert=VgPBLrGxnGUAHd9yVsiIL7b1B2fM6FW6CiKzySN7+auze75fgesLCXROfB2WYUA94F6uRw iat-mode=0
Bridge obfs4 195.15.243.63:3785 A153FC7E9511BC3AC419B0E9F404C57552CC1FDB cert=ZEM3GeJaLxg6W+QZDC2J0IenjkQQoZsr0sLofSxWlGoP8tWVZ7yz/lPZFHU0WKMrelg1Qw iat-mode=0
Bridge obfs4 195.15.243.194:3785 A246FBDC99CAA1135B48F79CDB6D697377F5C98F cert=8cnIV+de6MHp+YAuRSXz4F7JL6pX+VuRrYe1JvfUOMHfobJWtsMSVCBs3mZT+dRLN2AIIA iat-mode=0
Bridge obfs4 195.15.243.212:3785 01A0C521775D042472D0FC5F6A14430B8AA2EE08 cert=xiLkxosrzh0SE0sAZdavQgecNrxHefFVTlSH7Tg37gkfJfAq1GZCoonIcQiQuU2BfFE4ag iat-mode=0
Bridge obfs4 185.177.207.226:11226 0DB4A518F83E4770A486F1E70A444BE47D6776E3 cert=0wUxxyIBvkWB1nUMLQ1g9UG24jNFdH8Qx1Iv6JGiEh9Iqg6I/LgqSyeldSC3o5M/8mqlOA iat-mode=0
Bridge obfs4 185.177.207.227:11227 A31C5A9598B82BEBCE88DEAD571CC4210512C72D cert=7xJrqlP6yuBWfW0ZZnfjlCtiXlVwsazYxZpqFsI7jpItoCkbX4a8ge20hg+yBEF+vvBpQg iat-mode=0

ServerTransportPlugin obfs2,obfs3,obfs4 exec /usr/bin/obfs4proxy
#### ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
ServerTransportListenAddr obfs4 0.0.0.0:36312

ExtORPort auto




#    UseBridges 1
# SocksPort 0
BridgeRelay 1
UpdateBridgesFromAuthority 1
ExcludeNodes {cn},{mo},{hk}
#DataDirectory /var/lib/tor
ORPort 27015 NoListen
ORPort [fd00::ac3b:c2b7:ff94:e37d]:27015 NoListen
ORPort 127.0.0.1:11241 NoAdvertise
ORPort [::1]:11241 NoAdvertise
# ExitRelay 0
Exitpolicy reject *:*
Nickname Dd---------------7
ContactInfo ada@----.com
PublishServerDescriptor 0
#RelayBandwidthRate 2560 KBytes
#RelayBandwidthRate 3840 KBytes
RelayBandwidthRate 12800 KBytes
#RelayBandwidthBurst 5000 KBytes

os: Debian Gnu/Linux 12
kernel: Linux localhost 6.5.0-0.deb12.4-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.5.10-1~bpo12+1 (2023-11-23) x86_64 GNU/Linux
tor: 0.4.8.10-1~d12.bookworm+1 amd64
error:
00:19:01 [ERR] Bug: /usr/bin/tor(_start+0x21) [0x5558b07b0f31] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /lib/x86_64-linux-gnu/libc.so.6(_libc_start_main+0x85) [0x7efc0778a285] (on Tor
│ 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /lib/x86_64-linux-gnu/libc.so.6(+0x271ca) [0x7efc0778a1ca] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(main+0x19) [0x5558b07b0ee9] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(tor_main+0x59) [0x5558b07b1329] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(tor_run_main+0x1e5) [0x5558b07b4fa5] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(do_main_loop+0xf1) [0x5558b07b9671] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /lib/x86_64-linux-gnu/libevent-2.1.so.7(event_base_loop+0x49f) [0x7efc0809ec1f] (on
│ Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /lib/x86_64-linux-gnu/libevent-2.1.so.7(+0x21402) [0x7efc0809e402] (on Tor 0.4.8.10
│ )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(notify_pending_waitpid_callbacks+0xf7) [0x5558b0849cb7] (on Tor
│ 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(process_notify_event_exit+0x49) [0x5558b0848319] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(+0xc9977) [0x5558b0811977] (on Tor 0.4.8.10 )
│ 00:19:01 [ERR] Bug: /usr/bin/tor(+0xc7d92) [0x5558b080fd92] (on Tor 0.4.8.10 )
─┘ 00:19:01 [ERR] Bug: /usr/bin/tor(tor_assertion_failed
+0x147) [0x5558b083dc57] (on Tor 0.4.8.10 )