16:59:10 #startmeeting Network team meeting, 13th June 2022 16:59:10 Meeting started Mon Jun 13 16:59:10 2022 UTC. The chair is ahf. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:59:10 Useful Commands: #action #agreed #help #info #idea #link #topic. 16:59:18 o/ 16:59:23 ack! meeting time! 16:59:24 hi ! 16:59:27 hello hello hello, our pad is at https://pad.riseup.net/p/tor-netteam-2022.1-keep 16:59:31 o/ 16:59:53 how are folks doing with their respective boards: https://gitlab.torproject.org/groups/tpo/core/-/boards ? 17:00:16 o/ 17:00:45 running out of Q2 arti stuff that is assigned to me. :) 17:00:49 still legit 17:01:13 (I'll grab more) 17:01:16 o/ partly here 17:01:44 very nice 17:01:55 dgoulet: anything on releases? 17:02:07 nope, not at the moment 17:02:09 I'm mostly arti#353 atm 17:02:25 (sorry to interrupt by being late, fetching the ticket #...) 17:02:58 Err, I mean arti#82 even. 17:03:03 No wait. 17:03:05 * Diziet shuts up 17:03:27 62 17:03:30 we don't have anything incoming for other teams, other than the cpu overload reporting issue 17:03:37 but i don't think that is urgent 17:04:01 no reminders 17:04:04 no discussion items 17:04:09 mikeperry: you wanna do s61? 17:04:27 ok 17:04:55 so I think first I will report on the DoS and load balancing 17:05:04 First, observe the DoS appears to be still ongoing, up to June 11tth: https://metrics.torproject.org/hidserv-rend-relayed-cells.html?start=2022-06-01&end=2022-06-13 17:05:14 Second, observe that bwauth votes became more sane, with the upgrade to 1.5.2: https://metrics.torproject.org/totalcw.html?start=2022-06-01&end=2022-06-13 17:05:29 Third, observe that at that point of upgrade, the op7 onionperf throughput began to rise again: https://metrics.torproject.org/onionperf-throughput.html?start=2022-06-01&end=2022-06-13&server=public 17:05:52 so the sbws upgrade to 1.5.2 has improved the situation under DoS 17:06:00 (hey, sorry I'm late) 17:06:00 this is great 17:06:39 nice 17:06:42 very nice 17:07:13 juga: are you still digging into the comparisons? is that tedious? I am trying to decide what is the most valuable next step here 17:07:39 mikeperry: yes, a bit, cause so far the data takes long to load and calculate ratios 17:07:48 i was trying to make it faster today 17:07:59 I feel like this might be sufficient evidence to declare the sbws congestion control upgrade a success; we may want to move to comparing beteen the upgraded bwauths 17:08:01 s/load/parse/ 17:08:17 ok, i can do that 17:08:45 and seeing how sbws votes correspond to overloaded relays 17:09:21 hmm, with the cdf relay stream bandwidth or other graph? 17:09:34 seems like the ddos actually having crossed its peak 17:09:47 assuming clients are involved 17:09:52 see e.g: https://metrics.torproject.org/userstats-relay-country.html?graph=userstats-relay-country&country=fi 17:09:59 and the same for de 17:11:03 and ro 17:11:22 interesting. the onion service rend cells is still high tho 17:11:43 yeah, i am a bit unsure here what's going on 17:12:51 yeah, I am scratching my head as to what is most important to look at right now 17:13:38 GeKo: are you able to do https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/38 without hiro, based on acutes work? 17:14:42 hiro will likely need to help me with looking at https://gitlab.torproject.org/tpo/network-health/metrics/onionperf/-/issues/40043 and https://gitlab.torproject.org/jnewsome/sponsor-61-sims/-/issues/17 17:14:58 mikeperry: yeah 17:15:11 i asked taking this off of hiro's plate 17:15:14 @mikeperry I told GeKo that I would do that because the outliers you mention that are those we need on https://gitlab.torproject.org/jnewsome/sponsor-61-sims/-/issues/17 17:15:25 yeah 17:15:37 s/that/there 17:15:47 for #17, I am most concerned about the Fast and Guard cutoff testing there 17:15:59 I will need to look for cutoffs for that this week 17:16:52 the outlier analysis I see as something to check out overload reporting vs onionperf vs sbws.. ie just analysis at this point to see how much things agree 17:17:19 ok 17:17:21 and to see if our overload relays happen to be at a certain capacity threshhold 17:17:32 i did the outlier analysis previously, so that should be possible 17:17:46 ie: it could inform the fast+guard cutoff stuff, but the filtering itself will be just cutoffs I think 17:17:48 ok then I'll leave it to GeKo 17:18:02 don't want to steal tickets from you :) 17:18:21 i am fine either way 17:18:27 nono please go ahead 17:18:37 kk 17:18:38 I know it is annoying to have to go back and forth a bunch between tickets also :) 17:18:48 I just thought it was an intermediate step for https://gitlab.torproject.org/jnewsome/sponsor-61-sims/-/issues/17 17:18:52 it's fine 17:19:05 and I will need hiro to help verify that the CBT filtering is working for https://gitlab.torproject.org/tpo/network-health/metrics/onionperf/-/issues/40043, and to help with Fast+Guard filtering analysis 17:19:22 yeah, makes sense 17:20:31 sounds good 17:20:33 jnewsome: if you are here, are there any usable updates on https://gitlab.torproject.org/jnewsome/sponsor-61-sims/-/issues/16? if not, is ok. I can just continue to use non-flooding for now 17:22:49 hiro: For https://gitlab.torproject.org/tpo/network-health/metrics/onionperf/-/issues/40043, some instructions on how to graph that for me, and more details on the weird Guard exception you hit that you mentioned in PM, on the ticket would be good. I am concerned about the CBT oddness 17:23:00 that may involve some back and forth and chitchatting 17:23:35 it should have made some difference.. it may be some artifact or bug or mis-measurement in onionperf that made it not different 17:23:37 yep I just updated the other ticket: https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/37#note_2812322 17:24:17 in particular, I am also wondering if circuit build time is included in onionperf's "time to first byte", or if that is just the stream time 17:24:32 yep 17:24:42 build time is included 17:25:14 ahh.. that may explain it. there will be a latency penalty if they have to rebuild a circuit because of timeout 17:25:31 I will follow up on that #37 with more questions tho 17:25:37 ok sounds good 17:27:19 anything else? 17:27:26 hiro: it sounds like you have the infos you need for https://gitlab.torproject.org/jnewsome/sponsor-61-sims/-/issues/16? 17:27:34 err damnit 17:27:39 for https://gitlab.torproject.org/jnewsome/sponsor-61-sims/-/issues/17 17:28:03 yep I need to know which percentiles you want to filter out 17:28:18 otherwise I think I am good 17:29:02 ok. it may be a bandwidth cutoff or percentile. and there will be different cutoffs for Guard vs Fast. I will have to look at the code in Tor for each again 17:29:13 ok thanks 17:30:04 ok. I think that is it for now 17:30:17 any other questions here? 17:30:32 i am good 17:30:36 * ahf good 17:30:38 Not from me 17:31:52 shall we call it? 17:32:52 fine with me 17:32:58 let's 17:33:04 thanks all! o/ 17:33:06 #endmeeting