[tor-bugs] #32672 [Core Tor/Tor]: Reject 0.2.9 and 0.4.0 in dirserv_rejects_tor_version()

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Mar 5 13:14:22 UTC 2020


#32672: Reject 0.2.9 and 0.4.0 in dirserv_rejects_tor_version()
-------------------------------------------------+-------------------------
 Reporter:  teor                                 |          Owner:  neel
     Type:  task                                 |         Status:
                                                 |  merge_ready
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.4.4.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  044-should, 043-backport,            |  Actual Points:
  041-backport, 042-backport, consider-          |
  backport-after-authority-test, fast-fix,       |
  network-health                                 |
Parent ID:                                       |         Points:  0.5
 Reviewer:  teor                                 |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by gk):

 Alright, I attached the
 [https://trac.torproject.org/projects/tor/attachment/ticket/32672/bug32672_emailed_20200225.txt
 file] containing all the relay operators with relays running obsolete Tor
 versions we want to reject (that's from last week). Additionally, I
 attached another
 [https://trac.torproject.org/projects/tor/attachment/ticket/32672/bug32672_control_20200305.txt
 file] showing the remaining operators on those versions, a bit more than a
 week after the email campaign.

 We can see that the amount got reduced by 1/3 which is encouraging, even
 though I have not made a detailed analysis yet whether the operators
 actually migrated to newer versions or shut them down or... Interestingly,
 though, the sum of the bandwidth shown for the relays in both files
 *rose*. I have not looked as to why this happened.

 Some explanations to the annotations I made on the file I used for sending
 the emails:

 "[x]" means I sent an email successfully.
 "[xf]" means I sent an email but I got an error back.
 "[xfam]" means I sent an email and asked to set `MyFamily` properly while
 I was at it.
 "[f due to $]" means I did not send an email due to $.

 Additionally, you'll see that I changed my strategy for sending mails to
 the operators during the whole process: First, I send the email and Cc'ed
 the network-health list without any `Reply-To` header. Then I did the same
 with `Reply-To` header set to the mailing list. Then I only Cc'ed the list
 with the proper `Reply-To` header if the email address was not obfuscated.
 And then due to complaints by folks subscribed to the list I sent the last
 batch of mails without Cc'ing the network-health.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32672#comment:36>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list