[tor-bugs] #24010 [Core Tor/Torflow]: Make bandwidth authorities use DNS, not IP addresses

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Nov 1 08:51:26 UTC 2017


#24010: Make bandwidth authorities use DNS, not IP addresses
------------------------------+------------------------
 Reporter:  teor              |          Owner:  aagbsn
     Type:  defect            |         Status:  new
 Priority:  High              |      Milestone:
Component:  Core Tor/Torflow  |        Version:
 Severity:  Normal            |     Resolution:
 Keywords:                    |  Actual Points:
Parent ID:  #21394            |         Points:  1
 Reviewer:                    |        Sponsor:
------------------------------+------------------------

Comment (by Sebastian):

 I made this change and now my bwauth doesn't measure the slice with the
 fast relays in a reasonable time. Excerpt from htop:

 {{{
  1632 bwscanner  39  19  445M  181M  9044 S  1.3  2.3  5:43.95 python
 bwauthority_child.py ./data/scanner.1/bwauthority.cfg 1
 14584 bwscanner  39  19  402M  147M  8852 S  0.0  1.9  0:00.00 python
 bwauthority_child.py ./data/scanner.2/bwauthority.cfg 7
 14583 bwscanner  39  19  395M  144M  8900 S  0.0  1.9  0:00.01 python
 bwauthority_child.py ./data/scanner.3/bwauthority.cfg 10
 14587 bwscanner  39  19  391M  142M  8836 S  0.0  1.9  0:00.00 python
 bwauthority_child.py ./data/scanner.4/bwauthority.cfg 7
 12572 bwscanner  39  19  393M  146M  9024 S  3.3  1.9  2:42.51 python
 bwauthority_child.py ./data/scanner.5/bwauthority.cfg 12
 14555 bwscanner  39  19  404M  184M  8896 S  0.0  2.4  0:00.03 python
 bwauthority_child.py ./data/scanner.6/bwauthority.cfg 10
 12742 bwscanner  39  19  463M  143M  8980 S  0.0  1.9  0:02.83 python
 bwauthority_child.py ./data/scanner.7/bwauthority.cfg 11
 10627 bwscanner  39  19  391M  143M  8852 S  0.0  1.9  0:03.80 python
 bwauthority_child.py ./data/scanner.8/bwauthority.cfg 10
 11385 bwscanner  39  19  462M  142M  8900 S  0.0  1.8  0:03.37 python
 bwauthority_child.py ./data/scanner.9/bwauthority.cfg 1
 }}}

 AFAIK, the number at the end of the line can be used to indicate progress
 in running through a slice after first startup. The above is paired with
 this:

 {{{
 WARN[Wed Nov 01 08:45:09 2017]:Only measured 48.000000 of the previous
 consensus bandwidth despite measuring 65.100000 of the nodes
 }}}

 To me that sounds like those reqlly fast nodes that are failing DNS now
 just simply slow down the measurement process instead of my bwauth
 deciding that they are unsuitable.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24010#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list