Re: [tor-relays] Are BWauths punishing 'bad' relays? (not publishing measurements)
We're not punishing on purpose, that's for sure. DirAuths may not vote on a relay to exclude it from the consensus, or may vote to give it BadExit, but BWAuths have no such mechanism, and I guess you'll just have to take the words of the individual operators to not do something as evil as try and muck with the measurements manually. The code here: https://gitweb.torproject.org/torflow.git/tree/NetworkScanners/BwAuthority has a new scanner, scanner 9, for measuring unmeasured relays specifically. It takes at least 2-3 days for a scanner to loop around and measure an entire partition. This problem _may_ have been with me. Since we're operating so few bwauths, one abstaining causes an issue. I'm not positive but I think mine may have been malfunctioning and not running scanners 1 and 9 correctly. (9 for the past 5 days, 1 for considerably longer.) I don't know why, nor am I certain it was occurring. I kicked things just now, so hopefully in 2 days everything is entirely back to normal and it doesn't occur again...? Independent of this failure, one theory we have about the bwauths needs to be proofed out. We believe that as relays move between scanner partitions (which are partitioned by speed), they may go one or two cycles without measurement. (Example: relay Alice falls into the the range covered by scanner1. when scanner1 completes and is ready to start over, Alice falls into the range by scanner2 and not scanner1; so scanner1 ignores it. When scanner2 completes at a different time than scanner1, Alice falls into the range covered by scanner1 and therefore scanner2 ignores it. Repeat for as long as you feel unlucky.) There are likely other failure cases. Something that could be done, is taking the individual bwauth votes (mine are at https://bwauth.ritter.vg/bwauth/ ) and doing some analysis on them. Unfortunately the files don't contain the id of the scanner that processed them (and I'm much to scared to edit the format in case it breaks parsing somewhere else...) But, one could still look at the time between measurements for every individual relay, and get the median and standard deviation. Look at outliers and see if they are multiples of the median. One could also look at the median time it takes for an unmeasured relay to become measured (this would require consensus data.) If this technique works* and we amend the output format to include the scanner ID, it could even become an alert script that says "Hey, looks like scanner4 is stuck!" or something. * Big if. Something that would definitely throw off measurements is when a bwauth is restarted, like I just restarted mine. But mine ran pretty solid for -tom On 18 August 2015 at 15:08, nusenu wrote: > Hi, > > this is actually a question to BWauth ops. > > even though the new onionoo measured flag data is not* yet completely > rolled out (since it has to be deployed for > a week to assign the flag > to all relays), I would have a question since the data says that > all relays in the previously detected AWS family [1] are unmeasured. > > I'm wondering whether this is a pure coincidence or on purpose (by > BWauths) or by some other yet to be found reason? > > thanks! > > [1] https://lists.torproject.org/pipermail/tor-talk/2015-July/038623.html > > The "spikes" in the following table brought me two that group again. > > > The table shows unmeasured running relays by the month they joined the > network (note this is based on preliminary onionoo data) > > The "spikes" are caused by relays mentioned in [1]. > > +---+-+ > | joinmonth | #relays | > +---+-+ > | 2015-07 | 3 | > | 2015-06 | 4 | > | 2015-05 | 2 | > | 2015-04 | 12 | <<< AWS family part II > | 2015-03 | 4 | > | 2015-02 | 35 | <<< AWS family part I > | 2015-01 | 2 | > | 2014-12 | 2 | > | 2014-11 | 8 | > | 2014-10 | 1 | > | 2014-09 | 3 | > | 2014-08 | 3 | > | 2014-07 | 2 | > | 2014-06 | 2 | > | 2014-05 | 1 | > | 2014-04 | 4 | > | 2014-03 | 1 | > | 2014-01 | 2 | > | 2013-11 | 1 | > | 2013-02 | 1 | > | 2012-04 | 1 | > | 2012-02 | 1 | > +---+-+ > onionoo data from 2015-08-18 18:00:00 (thecthulhu instance) > > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Are BWauths punishing 'bad' relays? I guess not.
> I'm wondering whether this is a pure coincidence or on purpose (by > BWauths) or by some other yet to be found reason? I guess I found the answer by looking at another spike (2014-11-01).. Since these relays came back altogether (they are a group after all) and probably had no measurement within the last 3 days they are unmeasured.. that would make sense. I'm wondering why the second group has no exit flag https://atlas.torproject.org/#search/TorExitNode Do exits have to have a measurement and/or certain uptime besides the 2 out of 3 ports rule (80,443,6667) to earn the exit flag? signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Are BWauths punishing 'bad' relays? (not publishing measurements)
Hi, this is actually a question to BWauth ops. even though the new onionoo measured flag data is not* yet completely rolled out (since it has to be deployed for > a week to assign the flag to all relays), I would have a question since the data says that all relays in the previously detected AWS family [1] are unmeasured. I'm wondering whether this is a pure coincidence or on purpose (by BWauths) or by some other yet to be found reason? thanks! [1] https://lists.torproject.org/pipermail/tor-talk/2015-July/038623.html The "spikes" in the following table brought me two that group again. The table shows unmeasured running relays by the month they joined the network (note this is based on preliminary onionoo data) The "spikes" are caused by relays mentioned in [1]. +---+-+ | joinmonth | #relays | +---+-+ | 2015-07 | 3 | | 2015-06 | 4 | | 2015-05 | 2 | | 2015-04 | 12 | <<< AWS family part II | 2015-03 | 4 | | 2015-02 | 35 | <<< AWS family part I | 2015-01 | 2 | | 2014-12 | 2 | | 2014-11 | 8 | | 2014-10 | 1 | | 2014-09 | 3 | | 2014-08 | 3 | | 2014-07 | 2 | | 2014-06 | 2 | | 2014-05 | 1 | | 2014-04 | 4 | | 2014-03 | 1 | | 2014-01 | 2 | | 2013-11 | 1 | | 2013-02 | 1 | | 2012-04 | 1 | | 2012-02 | 1 | +---+-+ onionoo data from 2015-08-18 18:00:00 (thecthulhu instance) signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] No guard flag?
On 18.08.2015 17:09, Tor Tor wrote: > That explains it, thanks. Related question. arm often reports > throughput around 1 Mbit/s. Why is my "measured" bandwidth only 110 > Kbit/s on blutmagie.de? (My connection is advertised as 10 Mbit and > always gets over 1 Mbit). > https://torstatus.blutmagie.de/router_detail.php?FP=741488d89b860e59d6391aca27a157e87eb533ff You are mixing up your units. Arm shows Bits, Blutmagie Bytes. Regards, Stefan ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] No guard flag?
On Tue, Aug 18, 2015 at 07:43:15AM -0400, 12xBTM wrote: > Advertised/Measured bandwidth is too low. This is true. > Only the top XX% (I think > 10-20%, I don't remember off-hand) of nodes (by bandwidth) are > eligible to become guard nodes. At the moment, that works out that > your node needs to have at least ~2MBps bandwidth to be be eligible > for the guard flag. It's actually the top quartile (25%), and everybody with 2000 units of consensus weight or more gets it. Currently the top 25% is faster than 2000 units, so that means in practice more than 25% of the relays are eligible for the Guard flag. https://trac.torproject.org/projects/tor/ticket/12690 --Roger ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] No guard flag?
On Mon, Aug 17, 2015 at 10:29 PM, Pascal Terjan wrote: >> https://globe.torproject.org/#/relay/741488D89B860E59D6391ACA27A157E87EB533FF > > Looking at the uptime graph, I would guess that having it up most of > the time would help (It was up only 93.31% of the time over the last > month) Ah, okay. I try to keep it up all the time, but it's a home computer, so there are times it gets rebooted or the internet connection goes out. On Tue, Aug 18, 2015 at 4:43 AM, 12xBTM <12x...@gmail.com> wrote: > Advertised/Measured bandwidth is too low. Only the top XX% (I think 10-20%, > I don't remember off-hand) of nodes (by bandwidth) are eligible to become > guard nodes. At the moment, that works out that your node needs to have at > least ~2MBps bandwidth to be be eligible for the guard flag. That explains it, thanks. Related question. arm often reports throughput around 1 Mbit/s. Why is my "measured" bandwidth only 110 Kbit/s on blutmagie.de? (My connection is advertised as 10 Mbit and always gets over 1 Mbit). https://torstatus.blutmagie.de/router_detail.php?FP=741488d89b860e59d6391aca27a157e87eb533ff -G > On 18.8.15 1:29, Pascal Terjan wrote: >> >> On 17 August 2015 at 21:23, Tor Tor wrote: >>> >>> Hi, >>> I'm running a relay node [1], and it's been up for a few days over 68 >>> days. >>> I was thinking it would get the guard flag around then. It has yet to get >>> the flag or have non-zero guard probability. Any idea why that is? Or >>> what I >>> could do to get it to be a guard? >>> >>> 1) >>> >>> https://globe.torproject.org/#/relay/741488D89B860E59D6391ACA27A157E87EB533FF >> >> Looking at the uptime graph, I would guess that having it up most of >> the time would help (It was up only 93.31% of the time over the last >> month) >> ___ >> tor-relays mailing list >> tor-relays@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] No guard flag?
Advertised/Measured bandwidth is too low. Only the top XX% (I think 10-20%, I don't remember off-hand) of nodes (by bandwidth) are eligible to become guard nodes. At the moment, that works out that your node needs to have at least ~2MBps bandwidth to be be eligible for the guard flag. On 18.8.15 1:29, Pascal Terjan wrote: On 17 August 2015 at 21:23, Tor Tor wrote: Hi, I'm running a relay node [1], and it's been up for a few days over 68 days. I was thinking it would get the guard flag around then. It has yet to get the flag or have non-zero guard probability. Any idea why that is? Or what I could do to get it to be a guard? 1) https://globe.torproject.org/#/relay/741488D89B860E59D6391ACA27A157E87EB533FF Looking at the uptime graph, I would guess that having it up most of the time would help (It was up only 93.31% of the time over the last month) ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays