16:58:52 #startmeeting Network team meeting, 16th May 2022 16:58:52 Meeting started Mon May 16 16:58:52 2022 UTC. The chair is ahf. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:58:52 Useful Commands: #action #agreed #help #info #idea #link #topic. 16:58:55 hello everyone 16:58:59 o/ 16:59:03 hihi 16:59:12 o/ 16:59:16 our pad is at https://pad.riseup.net/p/tor-netteam-2022.1-keep 16:59:21 wow, early meeting start today 16:59:27 o/ 16:59:50 yes, i am having a bit of a chaos day today, so i was also off by a few seconds for the meeting 17:00:33 did someone go over our pad and fix all my incorrect usages of is vs are ? :-s 17:00:53 how are folks doing with their boards: https://gitlab.torproject.org/groups/tpo/core/-/boards ? 17:01:11 hi 17:01:51 I believe okay. Finaally making progress on arti#439. 17:01:56 board is fine 17:01:57 hoping to wrap up arti#329 soon 17:02:04 then maybe finally something else :) 17:02:11 looks like people have become very good at using the Q2 label! thank you all for that 17:02:53 nice 17:02:59 i don't see anything obviously off 17:03:06 dgoulet: anything on releases for tor.git ? 17:03:45 not much no, still want to go soon for 045 and 046 but might not be this week due to nsec.io 17:03:54 that is about it 17:04:21 sounds good 17:04:24 enjoy nsec! 17:04:57 don't see anything incoming from other teams 17:05:00 o/ 17:05:19 core/tor#40597 is funky 17:05:24 juga: o/ 17:05:33 juga: you have something you want to talk about or you arrived? :-p 17:06:09 arrived, sorry :) 17:06:16 ah, good good, just wanted to be sure 17:06:29 i see no reminders or announcements 17:06:34 mikeperry: you wanna talk about s61? 17:06:53 yeah yeah 17:07:20 so overall everything is looking OK with respect to congestion control deployment 17:07:47 we put out the blog post and tor-relays post to get exits to upgrade 17:07:53 https://blog.torproject.org/congestion-contrl-047/ 17:08:00 https://lists.torproject.org/pipermail/tor-relays/2022-May/020535.html 17:08:17 about 1100/1500 exits have upgraded according to ggus 17:08:42 I am curious what the fraction of exit consensus weight this is 17:08:42 nice 17:09:06 we're not seeing much increase in bandwidth consumption.. only advertised bandwidth 17:09:16 see: https://metrics.torproject.org/bandwidth-flags.html 17:09:16 i could imagine higher than 2/3 of the total weight if these are the people that track our releases well 17:09:36 this likely means that our users are, for the most part, not using Tor 0.4.7 17:09:47 * ahf nods 17:10:36 hiro is working on upgrading the onionperf instances to 0.4.7. last I heard, those will be new instaces, so the difference is clear there 17:10:39 or will be 17:10:46 yes 17:11:00 hiro: what is the ticket for that? 17:11:11 https://gitlab.torproject.org/tpo/network-health/metrics/onionperf/-/issues/40040 17:11:25 is 0.4.7 in a released TBB yet? 17:11:37 alpha 17:11:42 jnewsome: no. alpha TBB only 17:12:25 the next scheduled TBB stable is May 31 17:12:38 but maybe we get lucky and there will be firefox 0day ;) 17:12:44 it is worth trying the alpha right now. i have gotten some nice downloads speeds there 17:12:57 mikeperry: with a quick script right now i get exits with 2 in flowctrl weight/ total consensus weight: 17:12:58 nod. so probably as expected then? IIUC most usage is via TBB? 17:13:00 >>> 30305090 / 117741140 17:13:03 0.25738743484223103 17:13:06 i'd think so 17:13:15 yeah 17:13:23 juga: so only 25% of the consensus has upgraded to 0.4.7? 17:13:26 of exits? 17:13:45 weight wrt total net 17:14:04 oh can you do weight vs total exit weight? 17:14:08 you have the same number with exit only? 17:14:10 ye 17:14:19 ok, will do 17:15:58 there's some trickyness with the sbws upgrade to congestion control, but juga is looking at that. https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/36 is the analysis ticket 17:17:09 mikeperry: yeah, hopefully last patch will make all cases work 17:17:47 eta,nickm,dgoulet: I have a test vector WIP branch for clock heuristics, RTT, and plumbing for vegas: https://gitlab.torproject.org/tpo/core/tor/-/issues/40443#note_2803259 17:17:55 for arti impl 17:18:10 with new quick script looks like exits with flowctrl2 weight is 0.8 of all the exits 17:18:30 \o/. not bad for 3 weeks since stable 17:18:35 nice, that better than i would have thought 17:18:53 (30305090KB / 38240006KB) 17:19:01 nifty 17:19:19 nice 17:19:43 it is good we have so much reachout to these operators. it seems to be making our life a lot easier 17:20:17 GeKo: any additional signs of overload or any other issues wrt the upgrade visibile so far? 17:20:28 (or any other network health updates?) 17:20:43 the overload monitoring looks good so far 17:21:03 i helped two operators in #tor-relays with 0.4.7.7 overload last week 17:21:10 pointing to the blog post etc. 17:21:20 but otherwise there is not much we got 17:21:35 toralf reported seeing a new notice line on his bridges: 17:21:36 Unexpected path length 4 for exit circuit , purpose 5 17:21:43 is that expected? 17:22:00 that's nothing that showed up pre 0.4.7.7 i think 17:22:00 oh my. the maze 17:22:09 The Maze? 17:22:12 :) 17:22:30 i leave that to you filing a ticket then, i guess 17:22:35 circuit construction maze. it should not be able to build 4 hop circuits, but it does. 17:22:47 if that's indeed to be a ticket 17:22:54 I noticed this with onion services in the picture.. bridges would be a new one 17:23:11 it's Real 17:23:34 mikeperry: i could need some help with replying to sebastian on the dir-auth list 17:23:44 even better if you just replied :) 17:24:17 oh, and someone needs to decide what to do with the 0.4.7.7 compilation failure on openbsd andreas hit 17:24:26 dgoulet: is that for a ticket? 17:24:31 i guess so? 17:24:58 ... what was the failure? it has been added to openbsd ports 17:24:58 otherwise nothing from my side 17:25:46 ahf: https://paste.debian.net/1241089/ 17:26:00 he compiles against libressl i think 17:26:02 it is LibreSSL... 17:26:22 but it's blocking him from upgrading the dir-auth 17:27:12 is it an up-to-date openbsd installation? have he looked in their ports file if the tor build does something special there like specifying a different libssl/libcrypto ? 17:28:07 yeah, it's up-to-date openbsd 7.1 17:28:52 not sure about the ports related question 17:30:02 it's like this: https://github.com/openbsd/ports/blob/master/net/tor/Makefile#L20-L24 17:30:19 it looks like they are setting a specific ssl-dir as part of their configure argument 17:31:49 so if they use libressl it finds that and breaks? 17:32:00 seems so 17:32:03 that's one guess, but i am not 100% sure 17:32:18 it doesn't look the port pulls in openssl here 17:32:26 unless wantlib = ssl means openssl, but i doubt that 17:32:59 err, actually 17:33:05 they carry around a lot of patches it seems: https://github.com/openbsd/ports/tree/master/net/tor/patches 17:33:26 https://github.com/openbsd/ports/blob/master/net/tor/patches/patch-src_lib_crypt_ops_crypto_rsa_openssl_c seems related 17:33:57 right 17:34:17 okay, i can continue the convo with andreas 17:34:24 maybe he should be hooked up with gman for some support here? it seems like stuff is packaged for their ports tree, but maybe he wants to compile it by hand himself? 17:34:33 yeah 17:34:54 if we can't solve it i'll get gman into the thread 17:35:27 sounds good, feel free to cc me too. i still have an openbsd install somewhere, but i am especially a bit sensitive to deal with the libressl/openssl crap situation the openbsd gang have put themselves in.. 17:35:49 but can try a build there locally on a openbsd vm if he can't get it to work ta all 17:36:02 understandable, thanks 17:36:14 np! thanks for following up on that 17:36:19 * ahf didn't even know one of the dirauth's was openbsd 17:36:28 anything else we want to talk about today? :-) 17:36:44 geko: wrt sebtasian, let's discuss after 17:37:07 I am good otherwise 17:37:16 ack 17:37:39 (although i need to get some food first) 17:38:15 arti people, remember we have public meeting on wednesday if we have something we want to talk about there 8) 17:38:22 and dgoulet is out for nsec a lot this week 17:38:30 otherwise, let's return to the non-work setting 17:38:33 * ahf also need food 17:38:34 ahf: I think it would be neat to check in on ongoing projects for arti meeting 17:38:34 ahf: Noted. FYI I will be afk on Thursday. 17:38:44 nickm, eta ^ 17:38:49 ack 17:38:53 Diziet: perfect! i saw you already updated the calendar, that is good 17:39:03 nickm: what is ongoing projects here? ongoing tasks? 17:39:07 Someone told me I should do that, so :-) 17:39:12 Diziet: ya, is very good 17:39:26 nickm: is this something we can do in our 1:1 tomorrow? 17:39:41 nickm: ongoing projects> +1 17:40:09 I was hoping for a task ~with moving actual bytes around" as you put it ... 17:40:19 ahf: I meant, at the arti meeting, it would be neat to go through the stuff for 1.0 and say how it's all going 17:40:28 Diziet: woo 17:40:52 ah 17:40:53 nickm: Too many of my existing things are "have done all the tractable bits" 17:41:01 sounds good, so something we do in the meeting, not something we have to prepare for the meeting? 17:41:18 yeah 17:41:27 sounds good, let's do that 17:41:30 ok, thanks all o/ 17:41:34 #endmeeting