[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Sep 9 09:20:12 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/10 ===
===========================================================================

version 32
Author: dope457
Date:   2013-09-09T08:40:46+00:00

   irc dev meeting

--- version 31
+++ version 32
@@ -132,6 +132,12 @@
   [XXX] https://gitweb.torproject.org/doctor.git
   [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-consensus-health
 
+On Tuesday September 3rd, the IRC meeting was held to discuss a progress on sponsor F [XXX]
+project. See Karsten Loesing’s notes for output [XXX].
+
+  [XXX] https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorF
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005370.html
+
 Vulnerabilities
 ---------------
 

version 31
Author: lunar
Date:   2013-09-09T08:38:49+00:00

   trim the introductory quote

--- version 30
+++ version 31
@@ -41,9 +41,9 @@
 Toward a better performance measurement tool
 --------------------------------------------
 
-“I just finished a first draft of a tech report sketching out the
-requirements and a software design for a new Torperf implementation“
-announced Karsten Loesing [XXX] on the tor-dev mailing list.
+“I just finished […] sketching out the requirements and a software design
+for a new Torperf implementation“ announced Karsten Loesing [XXX] on
+the tor-dev mailing list.
 
 The report begins with: “Four years ago, we presented a simple tool to
 measure performance of the Tor network.  This tool, called Torperf,

version 30
Author: lunar
Date:   2013-09-09T08:37:19+00:00

   cover torperf rewrite

--- version 29
+++ version 30
@@ -38,6 +38,43 @@
 
  XXX:Expand
 
+Toward a better performance measurement tool
+--------------------------------------------
+
+“I just finished a first draft of a tech report sketching out the
+requirements and a software design for a new Torperf implementation“
+announced Karsten Loesing [XXX] on the tor-dev mailing list.
+
+The report begins with: “Four years ago, we presented a simple tool to
+measure performance of the Tor network.  This tool, called Torperf,
+requests static files of three different sizes over the Tor network and
+logs timestamps of various request substeps. These data turned out to be
+quite useful to observe user-perceived network performance over 
+time [XXX]. However, static file downloads are not the typical use case
+of a user browsing the web using Tor, so absolute numbers are not very
+meaningful. Also, Torperf consists of a bunch of shell scripts which
+makes it neither very user-friendly to set up and run, nor extensible to
+cover new use cases.”
+
+The specification lay out the various requirements for the new tool, and
+details several experiments like visiting high profile websites with an
+automated graphical web browser, downloading static files, crafting a
+canonical web page, measuring hidden service performance, and checking
+on upload capacity.
+
+Karsten added “neither the requirements nor the software design 
+are set in stone, and the implementation, well, does not exist yet.
+Plenty of options for giving feedback and helping out, and most parts
+don't even require specific experience with hacking on Tor. Just in case
+somebody's looking for an introductory Tor project to hack on.”
+
+Saytha already wrote that this was enough material to get the 
+implementation started [XXX]. The project needs enough work for anyone 
+interested. Feel free to join him!
+
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005386.html
+  [XXX] https://metrics.torproject.org/performance.html
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005388.html
 
 Monthly status reports for XXX month 2013
 -----------------------------------------
@@ -174,7 +211,6 @@
  * arma's blog post https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
  * another research paper about hidden services https://lists.torproject.org/pipermail/tor-talk/2013-September/029856.html
  * fox-it blog post https://lists.torproject.org/pipermail/tor-talk/2013-September/029862.html http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/
- * Karsten's first draft of Requirements and Software Design for a Better Tor Performance Measurement Tool https://lists.torproject.org/pipermail/tor-dev/2013-September/005386.html
  * Tor encryption vs. latest revelations about NSA https://lists.torproject.org/pipermail/tor-talk/2013-September/029929.html https://lists.torproject.org/pipermail/tor-talk/2013-September/029930.html
  * Testing flash proxy infrastructure https://lists.torproject.org/pipermail/tor-dev/2013-September/005402.html
  * Quickly testing TOR using Chutney and Fluxcapacitor https://lists.torproject.org/pipermail/tor-dev/2013-September/005403.html
version 29
Author: lunar
Date:   2013-09-09T07:58:06+00:00

   cover gsoc and doctor

--- version 28
+++ version 29
@@ -69,20 +69,31 @@
 Miscellaneous news
 ------------------
 
-Thanks Frenn vun der Enn [XXX] for setting up a new mirror [XXX] of the Tor project website.
+Thanks Frenn vun der Enn [XXX] for setting up a new mirror [XXX] of the 
+Tor project website.
 
-[XXX] http://enn.lu/
-[XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-September/000351.html
+  [XXX] http://enn.lu/
+  [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-September/000351.html
 
-Item 1 with cited source [XXX].
+With the Google Summer of Code ending in two weeks, the students have 
+sent their the next to last reports: Kostas Jakeliunas for the 
+Searchable metrics archive [XXX], Johannes Fürmann for EvilGenius [XXX],
+and Hareesan for the Steganography Browser Extension [XXX].
 
-Item 2 with cited source [XXX].
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005380.html
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005394.html
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005409.html
 
-Item 3 with cited source [XXX].
+Damian Johnson anounced [XXX] he had completed the rewrite of DocTor in
+Python [XXX],  “a service that pulls hourly consensus information and
+checks it for a host of issues (directory authority outages, expiring
+certificates, etc). In the case of a problem it notifies
+tor-consensus-health@ [XXX], and we in turn give the authority operator 
+a heads up.”
 
- [XXX]
- [XXX]
- [XXX]
+  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000338.html
+  [XXX] https://gitweb.torproject.org/doctor.git
+  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-consensus-health
 
 Vulnerabilities
 ---------------
@@ -163,9 +174,7 @@
  * arma's blog post https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
  * another research paper about hidden services https://lists.torproject.org/pipermail/tor-talk/2013-September/029856.html
  * fox-it blog post https://lists.torproject.org/pipermail/tor-talk/2013-September/029862.html http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/
- * gsoc: reports Kostas Jakeliunas Searchable metrics archive https://lists.torproject.org/pipermail/tor-dev/2013-September/005380.html ; Johannes Fürmann EvilGenius https://lists.torproject.org/pipermail/tor-dev/2013-September/005394.html; Hareesan https://lists.torproject.org/pipermail/tor-dev/2013-September/005409.html
  * Karsten's first draft of Requirements and Software Design for a Better Tor Performance Measurement Tool https://lists.torproject.org/pipermail/tor-dev/2013-September/005386.html
  * Tor encryption vs. latest revelations about NSA https://lists.torproject.org/pipermail/tor-talk/2013-September/029929.html https://lists.torproject.org/pipermail/tor-talk/2013-September/029930.html
- * Doctor rewrite https://lists.torproject.org/pipermail/tor-reports/2013-September/000338.html
  * Testing flash proxy infrastructure https://lists.torproject.org/pipermail/tor-dev/2013-September/005402.html
  * Quickly testing TOR using Chutney and Fluxcapacitor https://lists.torproject.org/pipermail/tor-dev/2013-September/005403.html
version 28
Author: lunar
Date:   2013-09-09T07:39:57+00:00

   move gsoc report

--- version 27
+++ version 28
@@ -65,7 +65,6 @@
 Tails https://lists.torproject.org/pipermail/tor-reports/2013-September/000336.html
 Aaron https://lists.torproject.org/pipermail/tor-reports/2013-September/000337.html
 Damian Johnson https://lists.torproject.org/pipermail/tor-reports/2013-September/000338.html
-Hareesan GSoC https://lists.torproject.org/pipermail/tor-dev/2013-September/005409.html
 
 Miscellaneous news
 ------------------
@@ -164,7 +163,7 @@
  * arma's blog post https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
  * another research paper about hidden services https://lists.torproject.org/pipermail/tor-talk/2013-September/029856.html
  * fox-it blog post https://lists.torproject.org/pipermail/tor-talk/2013-September/029862.html http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/
- * gsoc: reports Kostas Jakeliunas Searchable metrics archive https://lists.torproject.org/pipermail/tor-dev/2013-September/005380.html ; Johannes Fürmann EvilGenius https://lists.torproject.org/pipermail/tor-dev/2013-September/005394.html
+ * gsoc: reports Kostas Jakeliunas Searchable metrics archive https://lists.torproject.org/pipermail/tor-dev/2013-September/005380.html ; Johannes Fürmann EvilGenius https://lists.torproject.org/pipermail/tor-dev/2013-September/005394.html; Hareesan https://lists.torproject.org/pipermail/tor-dev/2013-September/005409.html
  * Karsten's first draft of Requirements and Software Design for a Better Tor Performance Measurement Tool https://lists.torproject.org/pipermail/tor-dev/2013-September/005386.html
  * Tor encryption vs. latest revelations about NSA https://lists.torproject.org/pipermail/tor-talk/2013-September/029929.html https://lists.torproject.org/pipermail/tor-talk/2013-September/029930.html
  * Doctor rewrite https://lists.torproject.org/pipermail/tor-reports/2013-September/000338.html

version 27
Author: dope457
Date:   2013-09-09T06:56:34+00:00

   Hareesan report

--- version 26
+++ version 27
@@ -65,6 +65,7 @@
 Tails https://lists.torproject.org/pipermail/tor-reports/2013-September/000336.html
 Aaron https://lists.torproject.org/pipermail/tor-reports/2013-September/000337.html
 Damian Johnson https://lists.torproject.org/pipermail/tor-reports/2013-September/000338.html
+Hareesan GSoC https://lists.torproject.org/pipermail/tor-dev/2013-September/005409.html
 
 Miscellaneous news
 ------------------

version 26
Author: dope457
Date:   2013-09-09T06:45:56+00:00

   fix

--- version 25
+++ version 26
@@ -15,7 +15,7 @@
 Tor 0.2.4.17-rc is out
 ----------------------
 
-On 5th Thursday, Roger Dingledine announced the release of a new release candidate 
+On 5th September, Roger Dingledine announced the release of a new release candidate 
 for Tor 0.2.4 series [XXX]. It comes with very handy feature in the current situation [XXX]
 - prioritizing faster and safer circuit-level handshakes "NTor" over "TAP" used by
 0.2.3 clients.

version 25
Author: dope457
Date:   2013-09-09T06:42:27+00:00

   0.2.4.17

--- version 24
+++ version 25
@@ -12,14 +12,32 @@
 Welcome to the eleventh issue of Tor Weekly News, the weekly newsletter that
 covers what is happening in the XXX Tor community.
 
-New Release of XXX
-------------------
+Tor 0.2.4.17-rc is out
+----------------------
 
-XXX: cite specific release date, numbers, and developers responsible
+On 5th Thursday, Roger Dingledine announced the release of a new release candidate 
+for Tor 0.2.4 series [XXX]. It comes with very handy feature in the current situation [XXX]
+- prioritizing faster and safer circuit-level handshakes "NTor" over "TAP" used by
+0.2.3 clients.
 
-XXX: details about release
+“Relays now process the new "NTor" circuit-level handshake requests with higher 
+priority than the old "TAP" circuit-level handshake requests. We still process 
+some TAP requests to not totally starve 0.2.3 clients when NTor becomes popular. 
+A new consensus parameter "NumNTorsPerTAP" lets us tune the balance later if we 
+need to. Implements ticket 9574 [XXX].”
 
- [XXX]
+Roger asks relay operators to consider upgrading to 0.2.4.17-rc version due the huge 
+circuit overload we see nowadays [XXX]. Upgrading to development branch is surprisingly
+easy using this guide [XXX].
+
+  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-September/029857.html
+  [XXX] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
+  [XXX] https://trac.torproject.org/projects/tor/ticket/9574
+  [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-September/002701.html
+  [XXX] https://www.torproject.org/docs/debian.html.en#development
+
+ XXX:Expand
+
 
 Monthly status reports for XXX month 2013
 -----------------------------------------
@@ -140,13 +158,13 @@
 
  * Asa's timeline about the rise of new users and events that could have affected Tor https://lists.torproject.org/pipermail/tor-talk/2013-September/029822.html
  * George forgot the torrc modification in his howto https://lists.torproject.org/pipermail/tor-relays/2013-September/002691.html
- * Karten's notes on IRC dev-meeting https://lists.torproject.org/pipermail/tor-dev/2013-September/005370.html / Nathan's https://lists.torproject.org/pipermail/tor-dev/2013-September/005371.html
+ * Karsten's notes on IRC dev-meeting https://lists.torproject.org/pipermail/tor-dev/2013-September/005370.html / Nathan's https://lists.torproject.org/pipermail/tor-dev/2013-September/005371.html
  * Tor 0.2.4.17-rc https://lists.torproject.org/pipermail/tor-relays/2013-September/002701.html https://lists.torproject.org/pipermail/tor-talk/2013-September/029857.html https://blog.torproject.org/blog/new-tor-02417-rc-packages
  * arma's blog post https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
  * another research paper about hidden services https://lists.torproject.org/pipermail/tor-talk/2013-September/029856.html
  * fox-it blog post https://lists.torproject.org/pipermail/tor-talk/2013-September/029862.html http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/
  * gsoc: reports Kostas Jakeliunas Searchable metrics archive https://lists.torproject.org/pipermail/tor-dev/2013-September/005380.html ; Johannes Fürmann EvilGenius https://lists.torproject.org/pipermail/tor-dev/2013-September/005394.html
- * Karten's first draft of Requirements and Software Design for a Better Tor Performance Measurement Tool https://lists.torproject.org/pipermail/tor-dev/2013-September/005386.html
+ * Karsten's first draft of Requirements and Software Design for a Better Tor Performance Measurement Tool https://lists.torproject.org/pipermail/tor-dev/2013-September/005386.html
  * Tor encryption vs. latest revelations about NSA https://lists.torproject.org/pipermail/tor-talk/2013-September/029929.html https://lists.torproject.org/pipermail/tor-talk/2013-September/029930.html
  * Doctor rewrite https://lists.torproject.org/pipermail/tor-reports/2013-September/000338.html
  * Testing flash proxy infrastructure https://lists.torproject.org/pipermail/tor-dev/2013-September/005402.html



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.
UPDATE LAST MAIL DATE


More information about the news-team mailing list