Hello everyone! here's your monthly minutes digest. :)
# Roll call: who's there and emergencies
anarcat, gaba, hiro, and linus present.
# What has everyone been up to
## hiro
- migrate gitlab-01 to a new VM (gitlab-02) and use the omnibus package instead of ansible (#32949)
- automate upgrades (#31957 )
- anti-censorship monitoring (external prometheus setup assistance) (#31159)
- blog migration planning and setting up expectations
## anarcat
<https://trac.torproject.org/projects/tor/query?owner=anarcat&status=closed&…>
AKA:
Major work:
* retire textile [#31686][]
* new gnt-fsn node (fsn-node-04) [#33081][]
* fsn-node-03 disk problems [#33098][]
* fix up /etc/aliases with puppet [#32283][]
* decomission storm / bracteata on February 11, 2020 [#32390][]
* review the puppet bootstrapping process [#32914][]
* ferm: convert BASE_SSH_ALLOWED rules into puppet exported rules [#33143][]
* decomission savii [#33441][]
* decomission build-x86-07 [#33442][]
* adopt puppetlabs apt module [#33277][]
* provision a VM for the new exit scanner [#33362][]
* started work on unifolium decom [#33085][]
* improved installer process (reduced the number of steps by half)
* audited nagios puppet module to work towards puppetization ([#32901][])
[#32901]: https://bugs.torproject.org/32901
Routine tasks:
* Add aliases to apache config on check-01 [#33536][]
* New RT queue and alias iff@tpo [#33138][]
* migrate sysadmin roadmap in trac wiki [#33141][]
* Please update karsten's new PGP subkey [#33261][]
* Please no longer delegate onionperf-dev.torproject.net zone to AWS [#33308][]
* Please update GPG key for irl [#33492][]
* peer feedback work
* taxes form wrangling
* puppet patch reviews
* znc irc bouncer debugging [#33483][]
* CiviCRM mail rate expansion monitoring [#33189][]
* mail delivery problems [#33413][]
* [meta-policy process][] adopted
* package installs ([#33295][])
* RT root noises ([#33314][])
* debian packaging and bugtracking
* SVN discussion
* contacted various teams to followup on buster upgrades (translation
[#33110][] and metrics [#33111][]) - see also [progress followup][]
* nc.riseup.net retirement coordination #32391
[progress followup]: https://help.torproject.org/tsa/howto/upgrades/buster/#Per_host_progress
[meta-policy process]: https://help.torproject.org/tsa/policy/tpa-rfc-1-policy/
[#33111]: https://bugs.torproject.org/33111
[#33110]: https://bugs.torproject.org/33110
[#33314]: https://bugs.torproject.org/33314
[#33295]: https://bugs.torproject.org/33295
[#33413]: https://bugs.torproject.org/33413
[#33189]: https://bugs.torproject.org/33189
[#33483]: https://bugs.torproject.org/33483
[#33536]: https://bugs.torproject.org/33536
[#31686]: https://bugs.torproject.org/31686
[#33081]: https://bugs.torproject.org/33081
[#33098]: https://bugs.torproject.org/33098
[#33138]: https://bugs.torproject.org/33138
[#33141]: https://bugs.torproject.org/33141
[#32283]: https://bugs.torproject.org/32283
[#32390]: https://bugs.torproject.org/32390
[#32914]: https://bugs.torproject.org/32914
[#33143]: https://bugs.torproject.org/33143
[#33261]: https://bugs.torproject.org/33261
[#33308]: https://bugs.torproject.org/33308
[#33362]: https://bugs.torproject.org/33362
[#33441]: https://bugs.torproject.org/33441
[#33442]: https://bugs.torproject.org/33442
[#33492]: https://bugs.torproject.org/33492
[#33277]: https://bugs.torproject.org/33277
[#33085]: https://bugs.torproject.org/33085
## qbi
- created several new trac components (for new sponsors)
- disabled components (moved to archive)
- changed mailing list settings on request of moderators
# What we're up to next
I suggest we move this to the systematic roadmap / ticket review instead in the future, but that can be discussed in the roadmap review section below.
For now:
## anarcat
* unifolium retirement (cupani, polyanthum, omeiense still to migrate)
* chase cymru and replace moly?
* retire kvm3
* new ganeti node
## hiro
- retire gitlab-01
- TPA-RFC-2: define how users get support, what's an emergency and what is supported (#31243)
- Migrating the blog to a static website with lektor. Make a test with discourse as comment platform.
# Roadmap review
We keep on using this system for march:
<https://trac.torproject.org/projects/tor/wiki/org/teams/SysadminTeam>
Many things have been rescheduled to march and april because we ran out of time to do what we wanted. In particular, the libvirt/kvm migrations are taking more time than expected.
# Policies review
TPA-RFC-1: policy; marked as adopted
TPA-RFC-2; support; hiro to write up a draft.
TPA-RFC-3: tools; to be brainstormed here
The goal of the new RFC is to define which *tools* we use in TPA. This
does not concern service admins, at least not in the short term, but
only sysadmin stuff. "Tools", in this context, are programs we use to
implement a "service". For example, the "mailing list" service is
being ran by the "mailman" tool (but could be implemented with
another). Similarly, the "web cache proxy" service is implemented by
varnish and haproxy, but is being phased out in favor of Varnish.
Another goal is to *limit* the number of tools team members should
know to be functional in the team, and formalize past decisions (like
"we use debian").
We particularly discussed the idea of introducing Fabric as an "ad-hoc
changes tool" to automate host installation, retirement, and
reboots. It's already in use to automate libvirt/ganeti migrations and
is serving us well there.
# Other discussions
A live demo of the Fabric code was performed some time after the
meeting and no one raised objections to the new project.
# Next meeting
No discussed, but should be on april 6th 2020.
# Metrics of the month
* hosts in Puppet: 77, LDAP: 81, Prometheus exporters: 124
* number of apache servers monitored: 31, hits per second: 148
* number of nginx servers: 2, hits per second: 2, hit ratio: 0.89
* number of self-hosted nameservers: 6, mail servers: 10
* pending upgrades: 174, reboots: 0
* average load: 0.63, memory available: 308.91 GiB/1017.79 GiB,
running processes: 411
* bytes sent: 169.04 MB/s, received: 101.53 MB/s
* planned buster upgrades completion date: 2020-06-24
--
Antoine Beaupré
torproject.org system administration
The main git server, cupani, is the machine you connect to when you push
or pull git repositories over ssh to git-rw.torproject.org. That
machines has been migrated to the new Ganeti cluster.
This required an IP address change from:
78.47.38.228 2a01:4f8:211:6e8:0:823:4:1
to:
116.202.120.182 2a01:4f8:fff0:4f:266:37ff:fe32:cfb2
DNS has been updated and preliminary tests show that everything is
mostly working. You *will* get a warning about the IP address change
when connecting over SSH, which will go away after the first
connection. That is normal. The SSH fingerprints of the host did *not*
change.
Please do report any other anomaly using the normal channels:
https://help.torproject.org/tsa/doc/how-to-get-help/
The service was unavailable for about an hour during the migration.
Thank you for your patience,
A.
PS: details of the work are available here:
https://trac.torproject.org/projects/tor/ticket/33446
--
Antoine Beaupré
torproject.org system administration
Hi!
Yesterday we had another round of our weekly network health meeting in
#tor-meeting. The IRC log was captured, as usual, by meetbot and can be
found at:
http://meetbot.debian.net/tor-meeting/2020/tor-meeting.2020-03-09-19.00.log…
(If you ever asked why there are sometimes pings like "Sebastian,
weasel, micah, arma1, stefani: dirauth update. Thanks!" in our
#tor-project channel seemingly out of the blue, be sure to read the
meeting log above as it contains an explanation of that is going on. :))
The details from our meeting pad are as follows:
Discussion:
- How to move forward with #32672 (bridges, timeframe, other nagging
efforts to upgrade)? [GeKo: phw whill contact bridge operators this week
and we'll make some recommendations for the network team as to when to
merge the patch in our meeting next Monday]
- How do we adjust meeting times due to DST? [GeKo: the plan is to
keep the UTC meeting time for now and move to 1800 UTC once the
Europeans have switched to DST as well]
Statuses:
GeKo:
Last week:
- more sbws work (help with reviewing #30726, started to look into
#33009 thinking about how to best test a fix within the integration
tests framework)
- looking at the bridges situation for #32672
- resume work on #32864
- feedback reviews
- look at ggus' Tor legal questions pad
(https://pad.riseup.net/p/tor-legal-questions-keep); email draft: ()
- tracked down a bug in stem
(https://github.com/torproject/stem/commit/7a0a8dd8d4218d5dabec3c2e47bebc4d1…)
that our doctor checks hit
- the usual bad relay activity
- sent out monthly team report for February
(https://lists.torproject.org/pipermail/tor-project/2020-March/002745.html)
- input for DRL proposal
This week:
- more sbws work
- #32864
- getting back to EFF for the legal questions update
juga:
Last week:
- Worked on #33570 Correct the relays to keep after retrieving new
consensuses
- Worked/revised on #30726 Missing relay keys in bandwidth file spec
Next week:
- Continue with #30726 Missing relay keys in bandwidth file spec
- Continue with #30719 Work out why 90% of sbws measurements fail
Gaba:
Not much related to network health.
Georg
Hello folks,
The meeting we had last Wednesday on the 4th of March had so few participants
that we went over the weekly items we always have, but postponed discussions
until more members of the team could be present.
Logs from the meeting the 4th of March:
http://meetbot.debian.net/tor-meeting/2020/tor-meeting.2020-03-04-22.59.html
Meeting notes from the meeting on the 24th of February:
1) We started out with roadmap.
2) We had discussions on reviews and in particular how to do reviews of TROVE
security issues.
3) We went over our 0.4.3 status page.
4) We discussed how to do the integration with Shadow in Tor.
5) Swati joined our meeting to say bye after she finished her work as a Google
Season of Docs student. Swati have done some excellent work on re-structuring
our Unix man pages and worked close together with Taylor on this.
6) Nobody had anything else for this meeting and the meeting was ended.
--- end of summary ---
You can read the network team meeting log at:
http://meetbot.debian.net/tor-meeting/2020/tor-meeting.2020-02-24-17.59.html
Below are the contents of our meeting pad:
Nick:
Week of 17 Feb (planned):
- Lots of code review
- Continue bug retrospective?
- Work on relay/dirauth modularization stuff
- Any C style work to do?
Week of 17 Feb (actual):
- Worked on lots of patches to make more relay code disabled when --disable-relay-mode
- lots of review and merge
- continued bug retrospective
- review and merge
- far too many meetings
- Revised pending patches
Week of 24 Feb (planned):
- Review and merge
- Try to advance TROVE-2020-00{1,2,3}
- Prepare for March
- Write policy proposals for adopting current acting policies, and adding a "critical" scurity level
- C style work as possible
- Try to finish bug retrospective?
- Try to work on smaller code-cleanup patches and any pending 043 issues
- Try to do a personal roadmap for next 3-4 months
catalyst:
week of 02/17 (2020-W08) (planned):
- TPI holiday 02/17
- reviews
- more gsod stuff as needed
- writing feedback
- create follow up ticket(s) for stuff out of scope for #32921
- dig a bit more into #32622
week of 02/17 (2020-W08) (actual):
- TPI holiday 02/17
- more gsod review (#33275)
- gsod: reviewed TOC and cross-ref linking (#33369)
- more review of #32921
week of 02/24 (2020-W09) (planned):
- reviews
- gsod wrap up (final reports, etc)
- writing feedback
ahf:
Week of 17/2 2020 (planned)
- Write email about a discussion I had with Peter Stuge and Linus at FOSDEM.
- Hack on 0.4.3 tickets.
- If the new GL instance comes up before Friday, try to do a run of ticket migrations to it to see if things are better. Write email to tor-project@ with an update.
- Look into crash issue in #32729
Week of 17/2 2020 (actually)
- Many meetings and post-meeting conversations/TODO list items.
- Tried to reproduce #32340 (I think we have had this ticket on all platforms now at some point)
- Hiro said GL instance is progressing. Worked on Trac Wiki to Markdown to GL wiki migration.
- Didn't get around to write Linus/Peter email.
Week of 24/2 2020 (planned)
- Get minimal test case working for TROVE issue.
- Do patch for #32165.
- Maybe write that Linus/Peter email :-)
- Figure out what is up and down with the Outreachy project(s).
asn:
Week of 17/02 (planned):
- Get back to OBv3.
- Get #32709 merged.
Week of 17/02 (actual):
- Got #32709 merged!
- Started working on OBv3 documentation.
Week of 24/02 (planned):
- Merge first round of OBv3 documentation.
- Finish OBv3 integration with travis/readthedocs/etc.
- Reviews.
dgoulet:
Week of Feb 17th (actual):
- Reviews and merges.
- Patch for #33361
- Requested testing on longclaw/moria for #33029. We got it merged
finally. We can move on to #33072.
- Tracing branch #32910 discussed with nickm. Experimented with various
possible fixes to nickm's comment.
- Spent a considerable amount of time analyzing Freenode tor's onion
service log to understand why the service stopped publishing its
descriptors. So I revived an old patch from #24346 and made it to
#33400.
- Confirming that #32672 will affect bridges.
- Paper revisions with Rob for our NetDev 0x14 submissions. Worked on the
slide outline as well.
Week of Feb 24th (planned):
- Work on #33072, #33400 (if need be)
- Revised #32910 (tracing branch from nickm's feedback).
- Do a little bit of slides for NetDev.
- Feedback writing.
- Need to think about the next things I'll work on for the next months.
Gaba:
Last week (actual):
- reduce scalabiltiy project to fit new requirements
Week of February 24th (planned)
- scalabiltiy project risks
- run behind trac
- s55 follow up
teor: (online first meeting of the month, offline at the usual meeting time)
Week of 10 February (planned):
Important:
- Write Draft of Proposal 313: Relay IPv6 Statistics (#33159)
- Revise Proposal 313 based on reviews
- respond to emails and IRC
Roadmap:
- open Sponsor 55 tickets for required work
- based on proposals
- with updated estimates
- make existing tickets children of Sponsor 55 parent tickets
Other:
- Ticket triage, backport deciding, quick code reviews
- Python 3 reviews / helping new contributors
Week of 10 February (actual):
Important:
- Write Proposal 313: Relay IPv6 Statistics (#33159)
- Revise Proposal 313 based on reviews
- Merge Proposal 313
- Create Sponsor 55 tickets, doing estimates, and writing a rough implementation order
- respond to emails
Roadmap:
- made some existing tickets children of Sponsor 55 parent tickets
- found a relay bandwidth stats bug that affects our bandwidth and connection stats (#33201), so I guess it's Sponsor 55.
- Turns out it's not a bug, it's a misleading comment.
- test IPv6 in CI (#33195 and children)
- fix protocol version sorting issue (#33285)
- help tom with info about IPv6 relays for consensus health (#33266)
- Start designing chutney reachability tests (#33232)
Other:
- Ticket triage, backport deciding, quick code reviews, merges
- Python 3 reviews / helping new contributors
- Help with manual page rewrite (#33188)
- Help with git scripts (#32121, #33284)
- Help with 0.4.3 logging fix (#33087)
Week of 17 February (planned):
Important:
Roadmap:
- chutney relay IP4 reachability self-tests (#33232)
- Add an ipv6 mixed network to chutney and tor
- #32588 Setting ORPort [ipv6]:auto mistakenly advertises port 94
- Maybe #33220 Prop 311: 3. Allow Relay IPv6 Extends
Other:
- Ticket triage, backport deciding, quick code reviews and ticket help
- Back to normal code reviews (thanks everyone for letting me focus on Sponsor 55 proposals!)
- Python 3 reviews / helping new contributors
Week of 17 February (actual):
Important:
- tor-relays moderation
- list moderation was taking a lot of time, and I need to focus on Sponsor 55,
so I'm stepping away from list moderation for a while
Roadmap:
- Make consensus voting more resistant to late votes (#4631)
- chutney relay IP4 reachability self-tests (#33232)
- Add an ipv6 mixed network to chutney and tor (#33334)
- Update the default chutney networks for new tor features (#33376)
- Use chutney's diagnostics in Tor's CI (#33353, #32792)
- Require all nodes to bootstrap (#33378)
- Working on: Require all relays in the consensus
- Next up is: Remove AssumeReachable 1 from relays
- chutney and tor changes to improve chutney tests
Other:
- Ticket triage, backport deciding, quick code reviews and ticket help
- Back to normal code reviews (thanks everyone for letting me focus on Sponsor 55 proposals!)
- Python 3 reviews / helping new contributors
- Some quick bug fixes
Mike:
week of 19 Feb (planned):
- Investigate/reproduce circpad shutdown bugs (#30992 and chutney warns); plan some fixes
- Mull over Research Janitor responsibilities and priorites
- Maybe review metrics-team tickets
week of 19 Feb (actual):
- Still discussing Reasearch Janitor role priorities
- Performance funding proposal work
week of 24 Feb (planned):
- Cashing in some banked overtime dayz (Monday+Tuesday)
- Probably keep discussing Reasearch Janitor role priorities
- Performance funding proposal work
- Metrics-team flashflow experiment+sbws review
- circpad bugs I hope? Coin toss for that vs metrics-team review
(though the metrics work is pretty cold now anyway... maybe it can wait some more)
jnewsome:
week of 02/03 (2020-W06) (actual):
- Onboarding logistics
- Fleshed out Shadow sponsor page a bit https://trac.torproject.org/projects/tor/wiki/org/sponsors/Sponsor38
- Fixed some Shadow compiler warnings and bugs (https://github.com/shadow/shadow/issues/711 and related issues)
week of 02/10 (2020-W07) (planned):
- Enable -Werror in Shadow, suppressing existing warnings if necessary (https://github.com/shadow/shadow/issues/711)
- Add clang compile to CI
- Fix remaining tests that listen on hard-coded ports (https://github.com/shadow/shadow/issues/718)
- Start planning Shadow TCP redesign
week of 02/10 (2020-W07) (actual):
- Fixed some additional warnings in Shadow, but haven't enabled -Werror yet. Now planning to only enable it in CI
- Investigated possibility of running Shadow CI inside Docker containers. Ran into issues with elfloader. Deferring for now since elfloader is planned to go away.
- Created Github CI action for shadow-plugin-tor (shadow-plugin-tor@head against with fixed versions of shadow and tgen)
week of 02/17 (2020-W08) (planned):
- Extract shadow-plugin-tor CI core logic into a shell script
- Set up shadow repository to also run the shadow-plugin-tor CI (shadow@head against fixed versions of shadow-plugin-tor and tgen)
- Suppress remaining compiler warnings in Shadow and enable -Werror in CI
- Start looking at TCP module and planning refactor/redesign
week of 02/17 (2020-W08) (actual):
- TPI holiday on Monday; vacation on Friday
- Extracted shadow-plugin-tor CI core logic into a shell script https://github.com/shadow/shadow-plugin-tor/pull/86
- Fixed remaining compiler warnings in Shadow (https://github.com/shadow/shadow/pull/725) and enabled -Werror in CI (https://github.com/shadow/shadow/pull/726)
- Started looking at TCP module and planning refactor/redesign, with an eye towards migrating it to Rust
week of 02/24 (2020-W08) (planned):
- Enable running the shadow-plugin-tor CI from the shadow repo (should be trivial after last week's refactor)
- Continue looking at TCP module and planning refactor/redesign, with an eye towards migrating it to Rust
- Phantom kickoff meeting this week (migrating Shadow to process-per-simulated-host)
- Create a tor trac ticket for "build for shadow", capturing the requirements
All the best,
Alex.
--
Alexander Færøy
Hi,
We will shortly be decommissioning the server that ran TorDNSEL and Tor
Check until now. The TorDNSEL software will be replaced on the new
server with software we will be able to more easily maintain going
forward. Service operators using the Tor Exit List service may need to
take action to avoid service interruption, details are contained later
in this post.
## For exit relay operators:
The primary change that comes with the new software is that exit
policies are no longer considered when deciding if an IP address is to
be included in the list. If we have observed an exit relay using an IP
address through our active measurements, this will be listed as an exit
relay in the new service regardless of the exit policy.
For exit relay operators that also route their own traffic via their
exit relay's IP address and have exit policies specifically to deny
access to services that block Tor traffic, such that those services will
allow you to connect without Tor, this will no longer work. We recommend
using a dedicated IP address for your exit relay. That allows your ISP
to more easily recognize that abuse complaints and DMCA notices can be
forwarded to you to be quickly responded to with a boilerplate response,
as opposed to cutting off your Internet access or providing your
personal information to the copyright cartels.
## For service operators:
Depending on how you obtain exit address information, you may need to
take action to avoid service interruption. If you are using CollecTor or
Onionoo, these interfaces will remain unchanged and are already
compatible with the new setup. If you are using the DNS exit list
service or the bulk exit list exporter then you may need to make changes.
### DNS exit list
The good news is that this service now behaves closer to a typical
DNS-based list service and so it may be easier to integrate into your
use-case now, and no longer require a custom implementation.
The old DNS exit list would have lookups that look like: <reverse client
ip>.<server port>.<reverse server ip>.ip-port.exitlist.torproject.org
For services that are accessed via multiple IP addresses, e.g. IRC
networks with multiple servers or websites behind load balancers, this
leads to service operators needing to perform multiple lookups in order
to have confidence that an IP address is not an exit relay. Instead,
services can now use this simplified service: <reverse client
ip>.dnsel.torproject.org, just like other DNS list services
(https://en.wikipedia.org/wiki/Domain_Name_System-based_Blackhole_List ).
If a client IP address is a Tor exit relay, the service will return with
an A record of 127.0.0.2. You'll also be able to look up a TXT record
with the fingerprint of the relay to learn more about the individual
relay. Note that some IP addresses are shared between multiple exit
relays, they will still only have one A record but may have multiple TXT
records, one for each fingerprint. If an IP address is not known in the
Tor network, the response will contain a NXDOMAIN (no such domain) status.
For example:
------------------------------------------------------------------------
$ dig +noall +comments +answer 199.72.247.162.dnsel.torproject.org
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46707
199.72.247.162.dnsel.torproject.org. 1080 IN A 127.0.0.2
------------------------------------------------------------------------
$ dig +noall +comments +answer 199.72.247.162.dnsel.torproject.org txt
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 29451
199.72.247.162.dnsel.torproject.org. 1095 IN TXT
"B34CC9056250847D1980F08285B01CF0B718C0B6"
------------------------------------------------------------------------
dig +noall +comments +answer 198.81.40.188.dnsel.torproject.org txt
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2678
------------------------------------------------------------------------
*The old DNS exit list service will be turned off on the 1st April 2020.
Please ensure you have updated to the new service before this time.*
### Bulk exit list changes
The bulk exit list exporter also used to consider exit policies, but
will now return all exit relay IP addresses regardless of the query
made. You should not need to make any modifications if you are using
this service but you may find that you can remove some complexity from
your client if you were filtering by service before. You can fetch a
list of all exit IP addresses seen from:
https://check.torproject.org/torbulkexitlist
This list is updated at most once every 40 minutes depending on the
number of exit relays in the network at the time, fetching it every hour
would be reasonable.
Thanks,
Iain.
Hello all,
The US have moved from Standard Time to Daylight Time and we have
updated the meeting times for the weekly network team meetings.
Please see an updated list at
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam
All the best,
Alex.
--
Alexander Færøy
Vegas Team Meeting Notes
March 5 2020:
+ NEW BUSINESS
- Should we cancel or reschedule the NY gathering from April or not?
Resolution: Maybe we'll move it to May and hope for the best.
- SVN people SVN! Can we move it to nextcloud?
Resolution: tl;dr: we’ll keep it for now.
+ GENERAL NOTES
Georg
1. Network health work
2. Alex's and my talk at foss-north got accepted (https://foss-north.se/2020/schedule.html#slot19), yay!
Antonela
1. Donation flow changes in www and tor browser
2. S27 is almost done
3. Slowly starting with S30
4. End of the month duties
5. Sent peer-feedback
6. Writing onion browser review
7. Reviewing OTF Learning Lab work
Anarcat
1. more work on libvirt/ganeti migration (#33085)
2. more work on check.tpo replacement
3. peer feedback work
4. taxes form wrangling
5. more gitlab patch review, hiro is finalizing the migration of the test instance to a new server right now!
6. znc irc bouncer debugging (#33483)
7. CiviCRM mail rate expansion monitoring (#33189)
8. more routine work (PGP key expiries, mail delivery problems #33413, etc)
Roger
1. Mike: I told Jim Newsome that when you have your act together, you'll be reaching out to him to describe our use cases and wishlists and goals for what we want from Shadow. That way he can have them in mind as he makes Shadow improvements, and who knows maybe he'll even lead the activities you ask for.
2. I'm planning to not submit a Defcon talk this year, since "every other year" is a fine rate for me. I am imagining to submit a CCC talk instead (finally). If you have opinions, please help me think through what is best to submit.
Gaba
1. Traveling: should we cancel or reschedule the NY gathering from April or not?
2. SVN people SVN! Can we move it to nextcloud?
3. Sponsor 30 check-in
4. Trac is up to date in my inbox
5. or library size reduction coordination
6. update time allocation usage
7. network team retrospective
8. peer feedback
9. gitlab follow up
Alex:
0. I will not be at this meeting as I'm traveling home from a conference in the other side of DK at this time.
1. Feedback writing and making sure I have received everything from folks as it comes in.
2. Network Team retrospective went well.
3. Going to dive into our new Gitlab setup on Friday.
4. End of month tasks.
5. Talking about Tor today in Aarhus with the Danish engineering union and on Wednesday at the University College in Odense.
6. Some follow ups from 1:1's, but the team seems to be doing good.
Steph
1. Finishing peer and self feedback
2. Catching up on DoH stuff so I feel more comfortable contributing. Matt and I will be talking about it more today so we can write a response.
3. Wrote an op-ed for Bitcoin Magazine
4. Newsletter went out Friday. GR did some testing and now it goes out in 3 hours and not 24.
5. Wrapped up Outreachy mentoring with annalee_! She completed projects of updating the press list and fixing blog tags. Submitted final feedback
6. Working with OTF learning lab on dark web demystifying. Also working internally to connect larger onion services goals.
7. Social media
8. Helping with NY event coordination
Sarah
1. Moving ahead with details for San Francisco and NYC events while monitoring covid19 developments.
2. Peer feedback.
3. Grants team working on DRL and OTF proposals.
4. Taking over fundraising related tasks from Jon.
isabela
1. 1st round of interview for ED assistant candidates (2nd round will be this coming week)
2. Reviewing proposals due this week (DRL Scalability work / DRL w/ tails and guardian project / OTF browser work)
3. continue to work on invites for EFF party and creating a plan b in case of covid-19 intervention :)
4. Writing self feedback
5. multiples 1:1 - including irl 1:1 w/ matt in nyc
pili
1. End/Start of month maintenance tasks: Tor Browser february report, trac backlog review, etc...
2. S9 sync
3. Moving github sponsors forward
4. Dealing with GSoC queries and updating ideas list accordingly
5. DRL Proposal
6. OTF Proposal revisions
7. Applied to the Learning Lab to showcase new features from Onion Services project
8. Trying to figure out if we're going to have someone from Tor attending a writing sprint for an online digital security training course
9. Some work on the dev portal - Dev teams should expect a request for feedback in the next few weeks :)
10. Peer and self feedback
11. Tor Browser Release meeting this week
ewyatt:
1. Reminder: all written feedback due tomorrow, March 6th (self, team lead, and peer)
2. Traveling, scrambling to get things together. I will be working remotely for most days (my time is on the AFK calendar)
3. Making progress on Exec Assistant recruiting
4. Still haven't gotten PTO's out, but it's still in top 3 spots on my list, hoping to get to it soon!
5. Contracts updates (still working on)
Karsten:
1. Exit scanner transition almost complete. \o/
2. Added dirbytes reported by dirauths (#33065), deployment still in progress.
Mike:
1. Helping with DRL proposal
2. Working on employee feedback
3. Untangling a decade of Tor organizational dysfunction, so I can get back to fixing its technical dysfunction.
Gus:
1. Reviewing Cleopatra's work (RT and documentation updates). Final feedback is due March 9.
2. Contacted partners that submitted proposals for our Tor Village and asked them if they want to be part of remote training program.
3. Traveling tonight for a workshop with journalists.
4. Submitted Tor activity to CryptoRave
5. Folks from a non-profit asked us if we can write a comment about strong encryption and human rights
6. Sponsor9 sync meeting
7. Still writing peer feedback
8. Outreachy: new contribution period starting today. We have two projects this round: https://trac.torproject.org/projects/tor/wiki/Outreachy
9. Reviewing DRL proposal.
10. Community Team is organizing a new Documentation Hackathon. plz open more tickets: https://lists.torproject.org/pipermail/tor-project/2020-March/002748.html
Nick
1. Hoping for releases in 5-10 days.
2. Starting on walking onions writeup
3. Wrapping up feedback. I might be late, but not by more than a day or two
4. Went to event on decentralized web yesterday. Interesting people, but I might have gained more had I known which days other stuff was happening. I should learn from this.
5. NYC event- go or no go?
Matt:
1. Collect team feedback
2. Moar Tor Browser releases
3. OTF Tor Browser proposal
4. (Beginning) W3C involvement
5. Conversation about engaging in IETF discussions around IP privacy \o/
6. Writing peer feeback