[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27416 [Core Tor/Tor]: Improve descriptor validation in Tor using Stem
#27416: Improve descriptor validation in Tor using Stem
--------------------------+----------------------------------
Reporter: teor | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-dirauth | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------+----------------------------------
Comment (by atagar):
> But the parsing check *still* won't be enough to catch all spec-
implementation divergences. And that's ok. Sometimes we fix the spec,
sometimes with fix tor, and sometimes we fix other parsers.
Yup. Agreed. :P
> Running stem as an essential part of dirauth operation is a significant
change in tor's security model. It would require a proposal.
Agreed, on reflection we shouldn't. In essence there's two directions we
can take: use stem's validators to **notify (file tickets)** or **enforce
(block malformed descriptors)**. We do the former nowadays, and should not
do the later without a lot of thought.
> If the checks are safe to make public, then send them to tor-consensus-
health, or create another list.
Will do! They're safe, the only reason I don't send them to the list is
because I'm the only person that would likely act upon them. Happy to give
it a shot.
There's a few spots where I've created automated notifications that follow
a certain pattern...
1. X commonly breaks.
2. I create a monitor to email me when X occurs.
3. When X occurs I file a ticket with the network team.
Honestly malformed descriptors are pretty minor pain point for me. They're
rare (one crops up every couple months?). I'll give tor-consensus-health@
a shot, but I have a sinking suspicion I'll still need to file tickets to
get traction.
Another more common annoyance for me are tor regressions. Every couple
weeks the following occurs...
1. Tor pushes a regression.
2. Stem's Jenkins test failures email me.
3. I wait a few days to see if it gets fixed.
4. When it becomes clear a fix isn't coming I pull and compile the new tor
codebase.
5. I reproduce the test failure locally and construct reproduction steps
that use telnet to take Stem out of the loop.
6. I file a ticket with the network team to get it addressed.
To the network team's credit their responsiveness when we get to #6 is
**fantastic**. Only trouble is that I'd like to take myself out of the
loop on these both (tor regressions and malformed descriptors).
For malformed descriptors I'll give tor-consensus-health@ a shot, and
reopen this if I still need to file a ticket.
As for tor regressions I've asked the Network team to run tor's stem test
target prior to pushing but no dice so far. Just dealt with another this
morning (#27446). Any thoughts on how we can drop me from the loop on
these?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27416#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs