Всем привет.
Есть машина с арчом, на ней есть тор с дефолтным конфигом. Тор не работает. Здесь можно много разбираться, почему так происходит, но меня смущает одна деталь: когда тор рестартится, он не шлёт вообще никаких исходящих пакетов. Вот кусок лога:
$ journalctl -r -u tor.service | head -33
Jan 10 22:12:47 #### systemd[1]: Started Anonymizing overlay network for TCP.
Jan 10 22:12:47 #### Tor[3853]: Signaled readiness to systemd
Jan 10 22:12:47 #### Tor[3853]: Starting with guard context "default"
Jan 10 22:12:47 #### Tor[3853]: Bootstrapped 0% (starting): Starting
Jan 10 22:12:47 #### Tor[3853]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Jan 10 22:12:47 #### Tor[3853]: Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Jan 10 22:12:47 #### Tor[3853]: Opened Control listener connection (ready) on 127.0.0.1:9051
Jan 10 22:12:47 #### Tor[3853]: Opening Control listener on 127.0.0.1:9051
Jan 10 22:12:47 #### Tor[3853]: Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 10 22:12:47 #### Tor[3853]: Opening Socks listener on 127.0.0.1:9050
Jan 10 22:12:47 #### Tor[3853]: Read configuration file "/etc/tor/torrc".
Jan 10 22:12:47 #### Tor[3853]: Tor was compiled with zstd 1.5.0, but is running with zstd 1.5.1. For safety, we'll avoid using advanced zstd functionality.
Jan 10 22:12:47 #### Tor[3853]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 10 22:12:47 #### Tor[3853]: Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma 5.2.5, Libzstd 1.5.1 and Glibc 2.33 as libc.
Jan 10 22:12:47 #### Tor[3853]: We compiled with OpenSSL 101010cf: OpenSSL 1.1.1l 24 Aug 2021 and we are running with OpenSSL 101010df: 1.1.1m. These two versions should be binary compatible.
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.267 [notice] Opened Control listener connection (ready) on 127.0.0.1:9051
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.267 [notice] Opening Control listener on 127.0.0.1:9051
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.267 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.267 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.265 [notice] Read configuration file "/etc/tor/torrc".
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.265 [warn] Tor was compiled with zstd 1.5.0, but is running with zstd 1.5.1. For safety, we'll avoid using advanced zstd functionality.
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.265 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 10 22:12:47 #### tor[3853]: Jan 10 22:12:47.265 [notice] Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma 5.2.5, Libzstd 1.5.1 and Glibc 2.33 as libc.
Jan 10 22:12:47 #### tor[3852]: Configuration was valid
Jan 10 22:12:47 #### tor[3852]: Jan 10 22:12:47.247 [notice] Read configuration file "/etc/tor/torrc".
Jan 10 22:12:47 #### tor[3852]: Jan 10 22:12:47.247 [warn] Tor was compiled with zstd 1.5.0, but is running with zstd 1.5.1. For safety, we'll avoid using advanced zstd functionality.
Jan 10 22:12:47 #### tor[3852]: Jan 10 22:12:47.247 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 10 22:12:47 #### tor[3852]: Jan 10 22:12:47.247 [notice] Tor 0.4.6.9 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1m, Zlib 1.2.11, Liblzma 5.2.5, Libzstd 1.5.1 and Glibc 2.33 as libc.
Jan 10 22:12:47 #### systemd[1]: Starting Anonymizing overlay network for TCP...
Jan 10 22:12:46 #### systemd[1]: Stopped Anonymizing overlay network for TCP.
Jan 10 22:12:46 #### systemd[1]: tor.service: Deactivated successfully.
Jan 10 22:12:46 #### systemd[1]: Stopping Anonymizing overlay network for TCP...
Jan 10 22:12:46 #### Tor[3735]: Interrupt: exiting cleanly.
Вот кусок капа в wireshark: https://0x0.st/oiy2.png
Виден мой пинг до 8.8.8.8 с целью убедиться, что захват работает, и ещё несколько очевидно не торовских пакетов. Вопрос: где трафик тора, почему его заело, как это диагностировать вообще?
Вот конфиг, если нужно (не менял почти ничего, только control port включил):
$ cat /etc/tor/torrc | grep -v '^\(#\|$\)'
User tor
Log notice syslog
DataDirectory /var/lib/tor
ControlPort 9051
HashedControlPassword 16:##########################################################