[tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

Tom Ritter tom at ritter.vg
Fri Apr 13 01:50:53 UTC 2018


I'm happy to run a sbws alongside my torflow. It will let us compare bw
numbers apples to apples too.  My only difficulty is being unable to spend
significant time to diagnose why it doesn't work, if it doesn't work.

If it's at the point I should give it a shot, point me at some instructions
:)

-tom

On Thu, Apr 12, 2018, 7:38 PM Matt Traudt <pastly at torproject.org> wrote:

> See below for the pad notes. Next meeting is scheduled 19 April 2018 at
> 2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
> use meetbot).
>
> -------------
>
>
> Simple Bandwidth Scanner meeting 12 April 2018
>
> #### Updates/Status messages ####
>
> pastly:
>     What's on my plate? <- doesn't have to be all in your plate :P
>     - Test coverage getting closer to 100%
>     - Immediate future: switch to standard python logging module, which
> is quite good
>     - Improving documentation
>     - Checking results against torflow
>     - Monitor CPU of sbws client/server
>     - +1 on considering asyncio
>     - See how chutney generates random strings
>     - Run testnet authority
>     - Reach out to current auths about running sbws/torflow and adding
> me as an auth
>
> juga:
>     - open/close PRs/issues about things to improve in doc, refactor
> code, etc..., but not changing functionality
>     - re. doc:
>         - thought to update sbws spec (or create other) to doc
> differences with Torflow, not sure it's useful
>         - i'd document further some of the classes/functions (as
> measure_relay)
>         - code doc vs spec (see below)
>     - find box to run other sbws, bwauth also in testnet?
>
> ## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
> - could we create all tickets needed to achive it?
> - maybe previous list is enough?
> Missing:
> - A consensus parameter stating the scaling factor
> - sbws config option to set fallback if no consensus param
> - `sbws generate` code to use the consensus param
>
>     -
>
> https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3
>
> - Correlation coefficient on comparision graphs
>
>
>
>
> ## Topic: comparing to torflow
> tah
> - Can we make the test sbws deployment a little bigger?
> - What else needs to be compared?
>
> teor: actually running it in a voting network, to check the feedback
> loop (if any) the scaling
>
> - Conclusions after comparing?
> - what we could think to change/improve after comparing?
>
> Graphs pastly can explain:
>     - sbws vs moria, sorted by sbws:
> https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
>     - sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w
>
>
> teor: the correlation seems good here
> If we're going to use these charts to compare, please compare two
> existing bwauths
> See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
> sbws-scaled line, it's wrong wrong wrong)
>
>
> ## Topic: convincing people to run sbws
> juga: maybe something to do when 1st sbws release?
> pastly: yes, probalby. unless we need to convince testnet people <- ah,
> right i was thinking on the Tor net
>
>
> ## Topic: status of open sourcing sbws
> - No real update. Time is still passing.
>
> ## Topic: specifications
>
> torflow/BwAuthority:
>
> https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt
> ,
> https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
> that also makes a nice summary
> sbws:
>
> https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
> (ask Pastly for access)
> bwscanner: no spec, but reading
>
> https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
> it looks like a Torflow clone <- almost :)
>
> We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
> We need a spec for bwauth migration, including acceptance criteria for
> new bwauth implementations
> Scanners should have their own detailed design documents
>
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20180413/fbac9270/attachment.html>


More information about the tor-dev mailing list