Matt Traudt
2018-04-13 00:38:14 UTC
See below for the pad notes. Next meeting is scheduled 19 April 2018 at
2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
use meetbot).
-------------
Simple Bandwidth Scanner meeting 12 April 2018
#### Updates/Status messages ####
pastly:
What's on my plate? <- doesn't have to be all in your plate :P
- Test coverage getting closer to 100%
- Immediate future: switch to standard python logging module, which
is quite good
- Improving documentation
- Checking results against torflow
- Monitor CPU of sbws client/server
- +1 on considering asyncio
- See how chutney generates random strings
- Run testnet authority
- Reach out to current auths about running sbws/torflow and adding
me as an auth
juga:
- open/close PRs/issues about things to improve in doc, refactor
code, etc..., but not changing functionality
- re. doc:
- thought to update sbws spec (or create other) to doc
differences with Torflow, not sure it's useful
- i'd document further some of the classes/functions (as
measure_relay)
- code doc vs spec (see below)
- find box to run other sbws, bwauth also in testnet?
## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
- could we create all tickets needed to achive it?
- maybe previous list is enough?
Missing:
- A consensus parameter stating the scaling factor
- sbws config option to set fallback if no consensus param
- `sbws generate` code to use the consensus param
-
https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3
- Correlation coefficient on comparision graphs
## Topic: comparing to torflow
tah
- Can we make the test sbws deployment a little bigger?
- What else needs to be compared?
teor: actually running it in a voting network, to check the feedback
loop (if any) the scaling
- Conclusions after comparing?
- what we could think to change/improve after comparing?
Graphs pastly can explain:
- sbws vs moria, sorted by sbws:
https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
- sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w
teor: the correlation seems good here
If we're going to use these charts to compare, please compare two
existing bwauths
See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
sbws-scaled line, it's wrong wrong wrong)
## Topic: convincing people to run sbws
juga: maybe something to do when 1st sbws release?
pastly: yes, probalby. unless we need to convince testnet people <- ah,
right i was thinking on the Tor net
## Topic: status of open sourcing sbws
- No real update. Time is still passing.
## Topic: specifications
torflow/BwAuthority:
https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt,
https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
that also makes a nice summary
sbws:
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
bwscanner: no spec, but reading
https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
it looks like a Torflow clone <- almost :)
We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
We need a spec for bwauth migration, including acceptance criteria for
new bwauth implementations
Scanners should have their own detailed design documents
2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
use meetbot).
-------------
Simple Bandwidth Scanner meeting 12 April 2018
#### Updates/Status messages ####
pastly:
What's on my plate? <- doesn't have to be all in your plate :P
- Test coverage getting closer to 100%
- Immediate future: switch to standard python logging module, which
is quite good
- Improving documentation
- Checking results against torflow
- Monitor CPU of sbws client/server
- +1 on considering asyncio
- See how chutney generates random strings
- Run testnet authority
- Reach out to current auths about running sbws/torflow and adding
me as an auth
juga:
- open/close PRs/issues about things to improve in doc, refactor
code, etc..., but not changing functionality
- re. doc:
- thought to update sbws spec (or create other) to doc
differences with Torflow, not sure it's useful
- i'd document further some of the classes/functions (as
measure_relay)
- code doc vs spec (see below)
- find box to run other sbws, bwauth also in testnet?
## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
- could we create all tickets needed to achive it?
- maybe previous list is enough?
Missing:
- A consensus parameter stating the scaling factor
- sbws config option to set fallback if no consensus param
- `sbws generate` code to use the consensus param
-
https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3
- Correlation coefficient on comparision graphs
## Topic: comparing to torflow
tah
- Can we make the test sbws deployment a little bigger?
- What else needs to be compared?
teor: actually running it in a voting network, to check the feedback
loop (if any) the scaling
- Conclusions after comparing?
- what we could think to change/improve after comparing?
Graphs pastly can explain:
- sbws vs moria, sorted by sbws:
https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
- sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w
teor: the correlation seems good here
If we're going to use these charts to compare, please compare two
existing bwauths
See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
sbws-scaled line, it's wrong wrong wrong)
## Topic: convincing people to run sbws
juga: maybe something to do when 1st sbws release?
pastly: yes, probalby. unless we need to convince testnet people <- ah,
right i was thinking on the Tor net
## Topic: status of open sourcing sbws
- No real update. Time is still passing.
## Topic: specifications
torflow/BwAuthority:
https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt,
https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
that also makes a nice summary
sbws:
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
bwscanner: no spec, but reading
https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
it looks like a Torflow clone <- almost :)
We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
We need a spec for bwauth migration, including acceptance criteria for
new bwauth implementations
Scanners should have their own detailed design documents