Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-13 Thread Damian Johnson
> Good question!
>
> While I didn't necessarily work on sbws while at my place of work, I
> couldn't rationalize that it is unrelated to my day job. Thus I need to
> get permission from my employer in order to release sbws.
>
> I've already submitted that paperwork and expect to get it back in about
> 2 weeks.
>
> It is licensed under CC0 and is therefore in the public domain (or will
> be... depending on how you want to interpret the situation).
>
> Fun side note: little-t-tor itself had to go through the same process.
>
> Sorry for the inconvenience.

A! Mystery solved. Makes complete sense - thanks Matt!
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-13 Thread Matt Traudt
On 4/13/18 12:26, Damian Johnson wrote:
>> https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
>> (ask Pastly for access)
> 
> Hi Matt, why is this repo read restricted? I was idly curious to see
> the code of sbws and was surprised it's effectively closed source.

Good question!

While I didn't necessarily work on sbws while at my place of work, I
couldn't rationalize that it is unrelated to my day job. Thus I need to
get permission from my employer in order to release sbws.

I've already submitted that paperwork and expect to get it back in about
2 weeks.

It is licensed under CC0 and is therefore in the public domain (or will
be... depending on how you want to interpret the situation).

Fun side note: little-t-tor itself had to go through the same process.

Sorry for the inconvenience.

Matt
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-13 Thread Damian Johnson
> https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
> (ask Pastly for access)

Hi Matt, why is this repo read restricted? I was idly curious to see
the code of sbws and was surprised it's effectively closed source.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-13 Thread Matt Traudt
Thanks Tom!

There's a few more things that I think we need to figure out before we
take you up on this offer.

I'll keep you in mind though, because I think having sbws and torflow
running side by side is something that should happen very soon.

Stay tuned! And thanks for your help obtaining torflow data recently.

Matt

On 4/12/18 21:50, Tom Ritter wrote:
> I'm happy to run a sbws alongside my torflow. It will let us compare bw
> numbers apples to apples too.  My only difficulty is being unable to
> spend significant time to diagnose why it doesn't work, if it doesn't work.
> 
> If it's at the point I should give it a shot, point me at some
> instructions :)
> 
> -tom
> 

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-12 Thread Tom Ritter
I'm happy to run a sbws alongside my torflow. It will let us compare bw
numbers apples to apples too.  My only difficulty is being unable to spend
significant time to diagnose why it doesn't work, if it doesn't work.

If it's at the point I should give it a shot, point me at some instructions
:)

-tom

On Thu, Apr 12, 2018, 7:38 PM Matt Traudt  wrote:

> See below for the pad notes. Next meeting is scheduled 19 April 2018 at
> 2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
> use meetbot).
>
> -
>
>
> Simple Bandwidth Scanner meeting 12 April 2018
>
>  Updates/Status messages 
>
> pastly:
> What's on my plate? <- doesn't have to be all in your plate :P
> - Test coverage getting closer to 100%
> - Immediate future: switch to standard python logging module, which
> is quite good
> - Improving documentation
> - Checking results against torflow
> - Monitor CPU of sbws client/server
> - +1 on considering asyncio
> - See how chutney generates random strings
> - Run testnet authority
> - Reach out to current auths about running sbws/torflow and adding
> me as an auth
>
> juga:
> - open/close PRs/issues about things to improve in doc, refactor
> code, etc..., but not changing functionality
> - re. doc:
> - thought to update sbws spec (or create other) to doc
> differences with Torflow, not sure it's useful
> - i'd document further some of the classes/functions (as
> measure_relay)
> - code doc vs spec (see below)
> - find box to run other sbws, bwauth also in testnet?
>
> ## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
> - could we create all tickets needed to achive it?
> - maybe previous list is enough?
> Missing:
> - A consensus parameter stating the scaling factor
> - sbws config option to set fallback if no consensus param
> - `sbws generate` code to use the consensus param
>
> -
>
> https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3
>
> - Correlation coefficient on comparision graphs
>
>
>
>
> ## Topic: comparing to torflow
> tah
> - Can we make the test sbws deployment a little bigger?
> - What else needs to be compared?
>
> teor: actually running it in a voting network, to check the feedback
> loop (if any) the scaling
>
> - Conclusions after comparing?
> - what we could think to change/improve after comparing?
>
> Graphs pastly can explain:
> - sbws vs moria, sorted by sbws:
> https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
> - sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w
>
>
> teor: the correlation seems good here
> If we're going to use these charts to compare, please compare two
> existing bwauths
> See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
> sbws-scaled line, it's wrong wrong wrong)
>
>
> ## Topic: convincing people to run sbws
> juga: maybe something to do when 1st sbws release?
> pastly: yes, probalby. unless we need to convince testnet people <- ah,
> right i was thinking on the Tor net
>
>
> ## Topic: status of open sourcing sbws
> - No real update. Time is still passing.
>
> ## Topic: specifications
>
> torflow/BwAuthority:
>
> https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt
> ,
> https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
> that also makes a nice summary
> sbws:
>
> https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
> (ask Pastly for access)
> bwscanner: no spec, but reading
>
> https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
> it looks like a Torflow clone <- almost :)
>
> We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
> We need a spec for bwauth migration, including acceptance criteria for
> new bwauth implementations
> Scanners should have their own detailed design documents
>
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-12 Thread Matt Traudt
See below for the pad notes. Next meeting is scheduled 19 April 2018 at
2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should
use meetbot).

-


Simple Bandwidth Scanner meeting 12 April 2018

 Updates/Status messages 

pastly:
What's on my plate? <- doesn't have to be all in your plate :P
- Test coverage getting closer to 100%
- Immediate future: switch to standard python logging module, which
is quite good
- Improving documentation
- Checking results against torflow
- Monitor CPU of sbws client/server
- +1 on considering asyncio
- See how chutney generates random strings
- Run testnet authority
- Reach out to current auths about running sbws/torflow and adding
me as an auth

juga:
- open/close PRs/issues about things to improve in doc, refactor
code, etc..., but not changing functionality
- re. doc:
- thought to update sbws spec (or create other) to doc
differences with Torflow, not sure it's useful
- i'd document further some of the classes/functions (as
measure_relay)
- code doc vs spec (see below)
- find box to run other sbws, bwauth also in testnet?

## Topic: what is still missing for milestone 1? (aka 1st release, v1.0.0)
- could we create all tickets needed to achive it?
- maybe previous list is enough?
Missing:
- A consensus parameter stating the scaling factor
- sbws config option to set fallback if no consensus param
- `sbws generate` code to use the consensus param

-
https://stem.torproject.org/api/descriptor/networkstatus.html#stem.descriptor.networkstatus.NetworkStatusDocumentV3

- Correlation coefficient on comparision graphs




## Topic: comparing to torflow
tah
- Can we make the test sbws deployment a little bigger?
- What else needs to be compared?

teor: actually running it in a voting network, to check the feedback
loop (if any) the scaling

- Conclusions after comparing?
- what we could think to change/improve after comparing?

Graphs pastly can explain:
- sbws vs moria, sorted by sbws:
https://share.riseup.net/#-W_zqcv-08AX4SnOgTatUw
- sorted by moria: https://share.riseup.net/#URXp6NccZHEhOPFJQcfO4w


teor: the correlation seems good here
If we're going to use these charts to compare, please compare two
existing bwauths
See: https://share.riseup.net/#lPGcIrgHp3ftnvTHUKqOKg (but ignore the
sbws-scaled line, it's wrong wrong wrong)


## Topic: convincing people to run sbws
juga: maybe something to do when 1st sbws release?
pastly: yes, probalby. unless we need to convince testnet people <- ah,
right i was thinking on the Tor net


## Topic: status of open sourcing sbws
- No real update. Time is still passing.

## Topic: specifications

torflow/BwAuthority:
https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority/README.spec.txt,
https://ohmygodel.com/publications/peerflow-popets2017.pdf has a section
that also makes a nice summary
sbws:
https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst
(ask Pastly for access)
bwscanner: no spec, but reading
https://github.com/TheTorProject/bwscanner/blob/develop/bwscanner/circuit.py#L45
it looks like a Torflow clone <- almost :)

We need a spec for the v3bw file that tor reads (in torspec/dir-spec.txt)
We need a spec for bwauth migration, including acceptance criteria for
new bwauth implementations
Scanners should have their own detailed design documents

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev