[tor-bugs] #30125 [Obfuscation/Snowflake]: Port server's log sanitization to client, broker, and proxy-go

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Apr 12 14:12:47 UTC 2019


#30125: Port server's log sanitization to client, broker, and proxy-go
-----------------------------------+------------------------------
 Reporter:  dcf                    |          Owner:  cohosh
     Type:  enhancement            |         Status:  needs_review
 Priority:  Medium                 |      Milestone:
Component:  Obfuscation/Snowflake  |        Version:
 Severity:  Normal                 |     Resolution:
 Keywords:                         |  Actual Points:
Parent ID:                         |         Points:
 Reviewer:                         |        Sponsor:  Sponsor19
-----------------------------------+------------------------------

Comment (by cohosh):

 Replying to [comment:4 dcf]:
 > The refactoring looks good. I have a few ideas about deployment to save
 us some trouble later. My main goal is that there should be a clean break
 between the old unsanitized logs and the new sanitized logs, so that we
 don't later have to trawl through a log file and figure out where the
 change happened. This is because I'd like us to extract what we need from
 the old logs and then delete them.
 >
 Thanks! This looks reasonable to me. Do you have something in mind for
 extracting useful data from the unsanitized logs? I suppose we could write
 a separate scrubber to sanitize them retroactively.

 > For the bridge, those logs are being rotated and not saved long-term, so
 we don't need to do anything special.
 >
 > For the broker, it will be something like this:
 > [...]
 > For proxy-go, it will be similar, except that there are several /home
 /snowflake-proxy/*.log.d log directories. Also /home/snowflake-proxy
 /snowflake-proxy-*.log{,.xz} are unsanitized logs from before we started
 using runit log directories (happened in #28390).
 I've noticed that there are a lot of old logs from different proxy-go
 instances. I'll set up the tarball to keep the directory structure, but I
 guess my question is the same as above about what we're planning on using
 these logs for.
 >
 > For the client, we'll need a Tor Browser ticket to pick up the upgrade.
 A sample ticket and patch that can serve as a template is #26795. I know
 you are interested in the reproducible build and this would be a good
 introduction to
 [[doc/TorBrowser/Hacking#BuildingOfficialTorBrowserReleaseBinaries|rbm]]
 if you haven't used it yet. Basically, you just need to edit
 projects/snowflake/config and update `git_hash`, then run `make testbuild`
 to make sure it still builds, then open a ticket in the Applications/Tor
 Browser component.
 Cool! I also wanted to ask you about thoughts you have about when to make
 snowflake client releases. I'm assuming it's just whenever there are
 changes we think are important to have people start using. But I also
 don't want to overwhelm the applications team.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30125#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list