Hi everyone,
The blog migration is almost completed and we now need your input for
some QA.
The new blog is live at: https://live-tor-blog-8.pantheonsite.io/
You can start using it and see if is there something amiss. You should
be able to login with your old blog credentials. If this doesn't work
you should be able to request a password reset.
Please consider that sending email directly from the blog platform can
be slow and unreliable, so if after a few minutes you haven't got your
reset email, send me a message and I'll do that for you.
If you find an issue you can check the master ticket:
https://trac.torproject.org/projects/tor/ticket/22013 and add your issue
to it.
Talk soon,
-hiro/silvia
Hi, all!
You can find the transcript of our regular network team meeting here:
http://meetbot.debian.net/tor-dev/2017/tor-dev.2017-05-22-17.00.html
Below are the contents of our meeting pad.
=========================
Network team status updates, 2017 May 22
Discussion topics:
- What is blocking 0.3.1.1-alpha, if anything?
- What do we want to know about onion services?
(teor is writing code to collect onion service stats on relays)
- How do we make sure that the bugs get fixed? (in 0.3.1.x) (and in 0.3.0.x)
- We should do more to test out oniongit.eu. What?
- Can we publicize our 'easy' tickets for new/volunteer devs, and
put more tickets in that category?
- And remove ones that aren't so "easy"
========
Updates
========
teor:
Last Week
- Feature freeze for PrivCount 1.0.0
(PrivCount collects tor stats and aggregates them securely.)
Paper: http://www.robgjansen.com/talks/privcount-ccs-20161027.pdf
Source: https://github.com/privcount
- So much PrivCount testing, fixed several counting and reliability bugs
- Found a PrivCount scaling issue that will probably need a
protocol redesign to fix
- Refresh the fallback directory mirror list:
https://lists.torproject.org/pipermail/tor-relays/2017-May/012285.html
This Week
- Update the PrivCount README (set up a live privcount network and
make sure it works)
- All going well, release PrivCount 1.0.0
- Start configuration and deployment for the next PrivCount
collection run (maybe?)
- Do some tor or chutney work: anyone have any suggestions?
I might revise the chutney DNS thing -
https://trac.torproject.org/projects/tor/ticket/21903
- Work on the PrivCount Onion Service collection design: what do
we want to know about onion services?
Nick
Last week:
* released 0.3.0.7
* froze 0.3.0
* dubious merges wrt timing: #1922, rust. Should I not have?
* prepared for 0.3.1.1-alpha (changelog, testing, cleanup, etc etc)
* worked on bugfixes
* tried to get proposal status right on more proposals
* distracted by AC installation (heat pumps are nifty)
This week:
* release 0.3.1.1-alpha
* try to get us focused on bugfix-mode for 0.3.1.x
* start prep for 0.3.2.x
* Try to get more progress w/ catalyst on the Tor side of UX improvements.
Roger:
This weekend: I started plowing through old trac tickets, to give
opinions on many of them so people can move forward.
This week: Continue doing more trac tickets, especially around the new
guard-spec design, and related future guard designs.
asn
[Will not be around for the actual meeting :(. Have to attend a birthday dinner.
Feel free to leave stuff for me on IRC and I will pick it up tomorrow]
[*] Last week:
- Lots of debugging/testing on #21969. Finally submitted a patch
for the bridge case today.
- Posted a list of open topics for HS guard discovery research:
https://lists.torproject.org/pipermail/tor-dev/2017-May/012260.html
- Worked with Mike to make schedule for the guard parts of the June network
team meetup. Need more feedback/brainstorming/thought.
- More work on prop224 client-side descriptor fetching (#21403).
- Updated guard-spec.txt based on feedback by Roger:
https://lists.torproject.org/pipermail/tor-dev/2017-May/012265.html
[*] This week:
- Finalize #21403, or bring it very close to the end
- Hopefully debug/fix the non-bridge case of #21969 as well.
- More preparation for the network team hackfest.
catalyst:
* Last week:
- based on IRC discussion #7869 needs some more work, including spec
changes for a new consensus method
- reviewed #21872 fixup patch
- helped toby_ with test stuff. discovered that test-stem doesn't
really work; filed #22301 about that
- found a shell arithmetic syntax error in chutney proposed a patch in #22302
- during some background research on bootstrapping found glossary
needed some additional definitions; added in #22296
- looked at some torbrowser-launcher stuff (sig verification and maybe
pushing fixes for that into Debian/Ubuntu)
* This week:
- review #21969 stuff some more
- document bootstrap process
- make more progress on bootstrap UX improvements
- sort out some apparently conflicting mental models of bootstrap, e.g., #22266
- give feedback on #7869
ahf:
Last week (unordered):
Sponsor 4:
- Got the consdiff and directory code to work together and landed
it (#21667).
- Fixed issue: #22305.
- Did a lot of testing with Chutney locally with current Tor HEAD + older
releases.
- Started to look into merging prop #278 changes to dir-spec.txt
- Reviewed some patches for prop#140.
Misc:
- Read up on prop #247 + its discussion as preparation for the upcoming
meeting.
- Got trip booked for the upcoming team meeting.
This week (ordered):
Sponsor 4:
- Finish the merging of prop #278 to dir-spec.txt (#22275)
- Fix issues with #22286
- Testing/bugfixing of 0.3.1-alpha release.
Misc:
- Need to spend some additional time wrapping my head around the guard
proposal for the upcoming meeting.
komlo:
- Last week:
- Created a separate branch for rust_smartlist for review/to build upon.
- Worked with manishearth for a POC to handle strings between
Rust/C. This uses malloc and free, which would keep the Rust/C
boundary more decoupled. We can re-review as we get further into Rust
implementation: github.com/Manishearth/freestring
- This week:
- Finish implementing protover_is_supported_here and
protover_compute_for_old_tor (will be ready for review after these)
isis:
Last Week:
- Emails about contracting/employment
- Spec'd #18329 and tried to move it forward
- Did other things in my time off
This Week:
- Doing other things, let me know if help is needed somewhere urgently
haxxpop:
Previously: I didn't do anything 'cause my paid job.
This Week: I think I have more time now. I will find something to do.
pastly:
- boring new-hire NRL travel stuff. Hopefully will get done before
Wilmington
- running experiments to determine if high priority traffic is
correctly being
prioritized over low priority traffic. Inconclusive so far. Is it
network variance?
Shadow is so nice. So hard to be sure of things on a live relay.
- for the above point, looking at EWMA cell_count values vs Tor
application queuing delay.
Also looking at TCP information.
This week:
- more of the same prioritization verification
- time to make serious efforts at documentation/tests for kist code
mike:
Last week:
- Worked on Guard meeting agenda with asn
- Discussion of catalyst and nick's bootstrap doc
- Planning travel
- Padding branch work
This week:
- Moar travel logistics
- Padding
Sebastian:
- reviewed a bunch of Rust code, preparing future branches for
smartlists/consdiff
- not that much time atm :/
isabela:
- last week: was sick for most of it, but sent out sponsor4 report
and worked on invoices for sponsor4 and R
- this week: i worked last week on my notes about the tor launcher
whiteboarding session i had with mike and isis, i hope to finish that
this week and share with people (from the launcher automation email
thread) and schedule a meeting to pick up on that, discuss my notes
and hopeflly answer some open questions I have.
Notes for May 18 2017 meeting:
Nick:
1) UX discussions seem to be confusing on our end; requirements still
unclear. Progress being made, though.
2) 0.3.0.7 released, 0.3.1.1-alpha coming soon. Freeze in effect.
3) My house now has enough AC for me to work.
4) Initial rust support branch is looking pretty nice
5) Going to work, per arma's suggestion, on cleaning up tor-core
security issue policy. Anybody else interested in adopting it?
Mike:
1) Working on Guard proposal and meeting agenda
2) Padding work
3) Conference with Mozilla about IoT
4) Figuring out several upcoming travel arrangement
Alison:
1) Not able to make it; teaching a workshop.
Arturo:
1) Quite some progress done on the orchestration system. Now the web
admin panel has ability to login, add scheduled measurements, list
clients and list scheduled jobs:
https://github.com/TheTorProject/proteus/pull/2.
2) Updated the Iranian testing list:
https://github.com/citizenlab/test-lists/pull/161
3) We released a new version of ooniprobe-mobile that is now out on the
stores supporting Arabic, Farsi, Russian, Greek and supporting
http-header-field-manipulation.
Georg:
1) Tor Browser 7.0a4 got out; there are about 2-3 weeks left to get Tor
Browser 7.0 into stable shape
2) Attended SIF17
Karsten:
1) Released metrics-lib 1.7.0, made plans for releasing 1.8.0, maybe
1.9.0, and 2.0.0 in the next six weeks.
2) Making plans for completing improvements to in-memory statistics
without breaking them.
Shari:
1) board meeting and followup
2) making appointments with foundation funders
3) interviewing and resume review for communications directors
4) getting ready for Tommy to start next week; lining up initial assignments
5) researching strategic planners
Hi everyone,
Unfortunately during a migration, some emails were triggered asking old
tor-blog users to activate their accounts.
Please ignore that. And sorry for the inconvenience.
-silvia/hiro
Hello!
Our weekly meeting logs are available here:
http://meetbot.debian.net/tor-dev/2017/tor-dev.2017-05-15-16.59.html
Below is a copy of the pad where we wrote our status reports:
=====
Network team status updates, 2017 May 15
FEATURE FREEZE TODAY*
Discussion topics:
- How have the stabilization periods worked historically ? [AHF]
- And how should they work this time? [nm]
- #21969 seems important! What to do?[asn]
- upcoming 0.3.0 and 0.3.1 releases [nm]
- hackfest date is June 12 through June 16 -- we might miss isis
and aaron j. with those should we try for 26-30 week?
- Bootstrap doc? #22265
========
Updates
========
dgoulet is out this week.
nickm:
Last week
- worked on reviewing merging a whole lot of tickets
- worked on consensus compression and storage
- today: just review and merge.
- Need somebody to review my pending 0.3.1 patches, today if possible?
This week
- new 0.3.0 and 0.3.1 releases
ahf:
Last week:
Sponsor4:
- Prop#278 changes, testing and finishing.
- Reviewed various patches and some spec changes.
- Helped out with an issue in compression issue that affected moria1
This week:
- Get things in for 0.3.1 freeze today :-)
- Stabilization period?
- Look into next Sponsor4 tasks?
pastly: vacation
Sebastian:
Doing some light rust stuff. Would still appreciate review on the
autoconf stuff
asn:
This week:
- Prepared skeleton implementation of prop224
client-side desc fetching
#21403. Code needs more tests, docs, beauty.
- Put #22006 in needs_review after addressing Yawning's review.
- Revised the e2e #21859 branch based on David's
comments. It's now ready to be
integrated to the larger service-side branch.
- Tested the TROVE-2017-002 patch and confirmed it
fixes the bug.
- Posted a plausible theory in #21969 about what the
bug could be (see last comment).
- Did some SponsorR bookkeeping
Next week:
- More work on client-side descriptor fetching/caching #21403.
- More work on #21969.
- More work on guard discovery stuff.
komlo:
- Last week
- Finished protover_compute_vote, getting closer to a full
protover Rust implementation
- Helped out with #21846
- This week
- Continue protover Rust implementation (hopefully should be done soon)
- Look into overriding CString to use malloc and free
Mike:
Last week:
- Reviewed on netflow testing ticket issues
- Worked with Isabela and Isis on Bridge discovery plans + UX
- Concerned about Guard discovery hackfest
This Week:
- Reviewing bootstrap doc
- Planning lots of travel
- Padding
catalyst:
- Last week
* [Coverity] #22221 (CID 1405983) fixed dead code in tests by swapping two loops
* [Coverity] #22231 (CID 1397192) an old issue that i figured out the
underlying problem for
* found that a Linux VM with 2GB RAM seems to make
--enable-fragile-hardening behave
better in the test suite; was previously getting OOM-killed in
slow/crypto/s2k_pbkdf2
* [sponsorM] my obfs4 boostrap failures probably related to #21969 and
directory guard stuff. added some comments and uploaded a log.
* [sponsorM] reviewing nickm's writeup about bootstrap state modeling;
also correspondence with Linda
draft at https://pad.riseup.net/p/OroadsO1qBgA
* [sponsorM] reproduced jump-to-80% on Linux with obfs4 and existing
state. also some 120 second timeout before giving up on a down
bridge? maybe this should be shorter?
* [sponsorM] opened #22232 to gather info about how Tor Launcher uses
the control channel; also read some of the Tor Launcher implementation
and have some confirmation that it uses the raw progress/phase numbers
as percent completion on the progress bar
- This week
* draft a wiki page with a high-level overview of the bootstrapping
process (#22265)
* outline some incremental changes to bootstrap progress reporting
that can make a large UX improvement
* look some more into #21969
* bug triage
Hi all,
In the next few days we will be in the process of upgrading
blog.torproject.org. While we get prepared to refurbish the space, the
current blog will be frozen for new content, starting now. This includes
posts and comments and, if everything goes as planned, it should only a
few days.
Thanks in advance for your patience. See you on the other side.
-hiro/silvia