Discussion:
[tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting
Matt Traudt
2018-04-13 00:38:14 UTC
Permalink
See below for the pad notes. Next meeting is scheduled 19 April 2018 at
2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
use meetbot).

-------------


Simple Bandwidth Scanner meeting 12 April 2018

#### Updates/Status messages ####

pastly:
What's on my plate? <- doesn't have to be all in your plate :P
- Test coverage getting closer to 100%
- Immediate future: switch to standard python logging module, which
is quite good
- Improving documentation
- Checking results against torflow
- Monitor CPU of sbws client/server
- +1 on considering asyncio
- See how chutney generates random strings
- Run testnet authority
- Reach out to current auths about running sbws/torflow and adding
me as an auth

juga:
- open/close PRs/issues about things to improve in doc, refactor
code, etc..., but not changing functionality
- re. doc:
- thought to update sbws spec (or create other) to doc
differences with Torflow, not sure it's useful
- i'd document further some of the classes/functions (as
measure_relay)
- code doc vs spec (see below)
- find box to run other sbws, bwauth also in testnet?

## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
- could we create all tickets needed to achive it?
- maybe previous list is enough?
Missing:
- A consensus parameter stating the scaling factor
- sbws config option to set fallback if no consensus param
- `sbws generate` code to use the consensus param

-
https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3

- Correlation coefficient on comparision graphs




## Topic: comparing to torflow
tah
- Can we make the test sbws deployment a little bigger?
- What else needs to be compared?

teor: actually running it in a voting network, to check the feedback
loop (if any) the scaling

- Conclusions after comparing?
- what we could think to change/improve after comparing?

Graphs pastly can explain:
- sbws vs moria, sorted by sbws:
https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
- sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w


teor: the correlation seems good here
If we're going to use these charts to compare, please compare two
existing bwauths
See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
sbws-scaled line, it's wrong wrong wrong)


## Topic: convincing people to run sbws
juga: maybe something to do when 1st sbws release?
pastly: yes, probalby. unless we need to convince testnet people <- ah,
right i was thinking on the Tor net


## Topic: status of open sourcing sbws
- No real update. Time is still passing.

## Topic: specifications

torflow/BwAuthority:
https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt,
https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
that also makes a nice summary
sbws:
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
bwscanner: no spec, but reading
https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
it looks like a Torflow clone <- almost :)

We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
We need a spec for bwauth migration, including acceptance criteria for
new bwauth implementations
Scanners should have their own detailed design documents
Tom Ritter
2018-04-13 01:50:53 UTC
Permalink
I'm happy to run a sbws alongside my torflow. It will let us compare bw
numbers apples to apples too. My only difficulty is being unable to spend
significant time to diagnose why it doesn't work, if it doesn't work.

If it's at the point I should give it a shot, point me at some instructions
:)

-tom
Post by Matt Traudt
See below for the pad notes. Next meeting is scheduled 19 April 2018 at
2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
use meetbot).
-------------
Simple Bandwidth Scanner meeting 12 April 2018
#### Updates/Status messages ####
What's on my plate? <- doesn't have to be all in your plate :P
- Test coverage getting closer to 100%
- Immediate future: switch to standard python logging module, which
is quite good
- Improving documentation
- Checking results against torflow
- Monitor CPU of sbws client/server
- +1 on considering asyncio
- See how chutney generates random strings
- Run testnet authority
- Reach out to current auths about running sbws/torflow and adding
me as an auth
- open/close PRs/issues about things to improve in doc, refactor
code, etc..., but not changing functionality
- thought to update sbws spec (or create other) to doc
differences with Torflow, not sure it's useful
- i'd document further some of the classes/functions (as
measure_relay)
- code doc vs spec (see below)
- find box to run other sbws, bwauth also in testnet?
## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
- could we create all tickets needed to achive it?
- maybe previous list is enough?
- A consensus parameter stating the scaling factor
- sbws config option to set fallback if no consensus param
- `sbws generate` code to use the consensus param
-
https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3
- Correlation coefficient on comparision graphs
## Topic: comparing to torflow
tah
- Can we make the test sbws deployment a little bigger?
- What else needs to be compared?
teor: actually running it in a voting network, to check the feedback
loop (if any) the scaling
- Conclusions after comparing?
- what we could think to change/improve after comparing?
https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
- sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w
teor: the correlation seems good here
If we're going to use these charts to compare, please compare two
existing bwauths
See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
sbws-scaled line, it's wrong wrong wrong)
## Topic: convincing people to run sbws
juga: maybe something to do when 1st sbws release?
pastly: yes, probalby. unless we need to convince testnet people <- ah,
right i was thinking on the Tor net
## Topic: status of open sourcing sbws
- No real update. Time is still passing.
## Topic: specifications
https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt
,
https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
that also makes a nice summary
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
bwscanner: no spec, but reading
https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
it looks like a Torflow clone <- almost :)
We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
We need a spec for bwauth migration, including acceptance criteria for
new bwauth implementations
Scanners should have their own detailed design documents
_______________________________________________
tor-dev mailing list
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Matt Traudt
2018-04-13 12:16:01 UTC
Permalink
Thanks Tom!

There's a few more things that I think we need to figure out before we
take you up on this offer.

I'll keep you in mind though, because I think having sbws and torflow
running side by side is something that should happen very soon.

Stay tuned! And thanks for your help obtaining torflow data recently.

Matt
Post by Tom Ritter
I'm happy to run a sbws alongside my torflow. It will let us compare bw
numbers apples to apples too.  My only difficulty is being unable to
spend significant time to diagnose why it doesn't work, if it doesn't work.
If it's at the point I should give it a shot, point me at some
instructions :)
-tom
Damian Johnson
2018-04-13 16:26:32 UTC
Permalink
Post by Matt Traudt
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
Hi Matt, why is this repo read restricted? I was idly curious to see
the code of sbws and was surprised it's effectively closed source.
Matt Traudt
2018-04-13 16:34:55 UTC
Permalink
Post by Damian Johnson
Post by Matt Traudt
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
Hi Matt, why is this repo read restricted? I was idly curious to see
the code of sbws and was surprised it's effectively closed source.
Good question!

While I didn't necessarily work on sbws while at my place of work, I
couldn't rationalize that it is unrelated to my day job. Thus I need to
get permission from my employer in order to release sbws.

I've already submitted that paperwork and expect to get it back in about
2 weeks.

It is licensed under CC0 and is therefore in the public domain (or will
be... depending on how you want to interpret the situation).

Fun side note: little-t-tor itself had to go through the same process.

Sorry for the inconvenience.

Matt
Damian Johnson
2018-04-13 16:52:13 UTC
Permalink
Post by Matt Traudt
Good question!
While I didn't necessarily work on sbws while at my place of work, I
couldn't rationalize that it is unrelated to my day job. Thus I need to
get permission from my employer in order to release sbws.
I've already submitted that paperwork and expect to get it back in about
2 weeks.
It is licensed under CC0 and is therefore in the public domain (or will
be... depending on how you want to interpret the situation).
Fun side note: little-t-tor itself had to go through the same process.
Sorry for the inconvenience.
Ahhhh! Mystery solved. Makes complete sense - thanks Matt!

Loading...