15:59:46 #startmeeting tor anti-censorship meeting 15:59:46 here is our meeting pad: https://pad.riseup.net/p/tor-anti-censorship-keep 15:59:46 feel free to add what you've been working on and put items on the agenda 15:59:46 Meeting started Thu Oct 12 15:59:46 2023 UTC. The chair is shelikhoo. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:59:46 Useful Commands: #action #agreed #help #info #idea #link #topic. 16:00:01 hello 16:00:14 hello! o/ 16:00:25 hi~ 16:00:36 hi 16:05:51 okay, let's start with an announcement: 16:05:52 A poll to set a date for a 'Future of PTs' voice conversation 16:05:52 https://www.systemli.org/poll/#/poll/YRRF8K19Bq/evaluation?encryptionKey=e1f9KPaHH6z7I6uYGNQVlegHvMGB3aHJaEufGQl7 16:05:52 Times in UTC 16:06:11 the first discussion topic we have is: 16:06:12 - (Network Health) 'Running' flag for counting bridges and network size https://gitlab.torproject.org/tpo/network-health/team/-/issues/318 16:06:12 as a follow up from last weeks discussion, let's try to agree on a date to have it over voice 16:06:32 the running flag point was added last week 16:06:39 was it ggus or GeKo? 16:07:04 anyway, is a conversation we are having with the metrics team to stop using the 'Running' flag to signal if a bridge is running 16:07:13 hooray :) 16:07:19 as we do support bridges without the ORPort public, and that will imply no running flag 16:07:34 hi 16:07:45 hello :) 16:07:55 GeKo: any specific questions we should discuss here about this? 16:07:56 i think ggus was filing the ticket and i did a bunch of investigations 16:08:19 so, there a different options i proposed in the ticket 16:08:25 about how to move forward 16:08:37 In the reproducible metrics guide, the "Running" flag also affects estimates of user counts, not just the estimate of the number of bridges. 16:08:47 which are mainly aimed at improving the relay-search side 16:08:49 yeah 16:09:16 the metrics are even harder because for those we don't take bridgestrap results into account yet at all 16:09:51 but it seems using bridgestrap is our best option in the longer run 16:09:57 did i get that right? 16:10:21 yes, I agree 16:10:35 either you use bridgestrap directly or we mediate it somehow from rdsys 16:10:40 okay. then we should think about how to make best use of it 16:10:46 but as you already poll bridgestrap maybe better to use it directly... 16:11:06 because using bridgestrap results just once a day is not ideal 16:11:32 relay-search is centered around hourly metrics 16:11:42 how are you polling bridgestrap? AFAIK the API is not reachable from outside localhost... 16:11:51 so, ideally we would get hourly bridgestrap results inputs here as well 16:12:00 just taking what we have on collector 16:12:09 which is getting updated daily at 0940UTC it seems 16:12:20 we can reduce the cache of bridgestrap (currently 18h) to 1h, so it test every bridge at least once per hour 16:12:41 https://collector.torproject.org/recent/bridgestrap/ 16:12:49 that would be nice 16:12:50 are descriptors from bridges that are not actually running very common? what happens if they are just all included? maybe the effect is negligible, even without filtering some out with bridgestrap etc.? 16:12:51 ok, so bridgestrap is publishing some collector file 16:12:56 yeah 16:13:00 and you need it to be published more regularly 16:13:21 yeah 16:13:45 dcf1: dunno 16:13:47 we envision a future were bridge testing is done by a constant connection to all bridges, there was a GSOC this summer working on that, but I haven't check how far they got 16:14:06 so we might retire bridgestrap at some point, but I'm happy to do the changes you need in the mean time 16:14:11 fyi I'll probably start playing with https://gitlab.torproject.org/tpo/core/arti/-/issues/717 (seems relevant to bridgrstrap convo) 16:14:51 meskio: there are some bridgestrap bugs which might spoil things a bit 16:15:08 one ticket i filed and then the ordering part unresolved 16:15:50 https://gitlab.torproject.org/tpo/anti-censorship/bridgestrap/-/issues/24#note_2948488 16:16:10 but those should not be blockers imo to get things changed 16:17:03 so, getting the results in an hourly fashion onto collector and testing hourly would be the changes i'd like to see if possible 16:17:39 once we are confident this is a good thing we can then tackle the larger question about what to do with our metrics on metrics.tpo 16:18:10 dcf1: the user count estimation relation was a good point, thanks 16:18:16 that's all from me 16:18:55 trinity-1686a: yes, that one is the one I was thinking on, there was a GSOC on it, isn't it? 16:18:55 I'm not sure, you should ask nick, I think he mentored them 16:18:55 GeKo: let me explore bridgestrap and see how to fix this and come back to you 16:18:55 I'll open an issue in our side for it 16:18:55 I wonder if we'll see any implications on running bridgestrap every hour insted of every18h, but I guess I'll need to experiment with it and see 16:18:55 as if bridgestrap is fast enought to test all bridges every 18h, maybe not 16:18:56 anything more we would like to discuss on this topic? 16:18:56 the next topic is: 16:18:56 - Armored Bridge line Spec 16:18:56 https://gitlab.torproject.org/tpo/anti-censorship/team/-/issues/126#note_2954127 16:18:56 So after sometime of delay, I have finally wrote the first version of the armored bridge line spec ready for a internal review 16:18:56 it does not have any shiny features, but should be easy enough to be implemented 16:18:56 s/every 18h/every 1h/ 16:18:56 that is all from my side 16:19:22 meskio: ack, thanks! 16:19:27 wired... maybe the irc connection is not stable 16:19:55 I am receiving a lot of desynchronised messages 16:20:12 I will send my lines again 16:20:19 the next topic is: 16:20:19 - Armored Bridge line Spec 16:20:19 https://gitlab.torproject.org/tpo/anti-censorship/team/-/issues/126#note_2954127 16:20:19 So after sometime of delay, I have finally wrote the first version of the armored bridge line spec ready for a internal review 16:20:19 it does not have any shiny features, but should be easy enough to be implemented 16:21:11 do we wants to discuss it now, or we wants discuss it next week 16:21:24 after we have enough time to have a look at it? 16:21:46 should the spec include details on how the URI looks like? 16:22:00 but yes, I'll properly read it for next week 16:22:21 yes, I will edit it to have a few examples in it 16:22:34 let's discuss it further next week 16:22:48 the last topic is 16:22:49 - snowflake broker restart(deployment) needed, and deletion of ip-count-mask key 16:22:49 https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40295 16:23:24 I am aware of this, and I will tag a new version of snowflake next monday and deploy it 16:23:31 I want the broker to stop writing to the log file so we have a finished artifact we can make public. 16:23:42 ok, thanks shelikhoo 16:24:15 on the issue I noted a potential difficulty with version control in /etc, which will have recorded the masking key. 16:26:00 yeah... we can stop recording first, and think about how to work with version control later 16:26:14 it would be possible to just amend and rebase the commits 16:26:20 that's what I was thinking 16:26:27 since it is not something we made public 16:26:47 so it shouldn't be that much an issue if we delay it for a little 16:27:24 okay anything more we would like to discuss on this topic? 16:27:25 in the worst case, if we lose all history in /etc and have to restart it, it's not a disaster imo. 16:27:30 no 16:28:16 anything we would like to discuss in this meeting? 16:28:25 anything more we would like to discuss in this meeting? 16:28:38 not from my side 16:29:20 #endmeeting