[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27416 [Core Tor/DocTor]: Improve descriptor validation in Tor using Stem
#27416: Improve descriptor validation in Tor using Stem
-----------------------------+----------------------------------
Reporter: teor | Owner: atagar
Type: defect | Status: new
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/DocTor | Version:
Severity: Normal | Resolution:
Keywords: tor-dirauth | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------+----------------------------------
Comment (by teor):
Replying to [comment:1 atagar]:
> ...
> > If the checks are safe to make public, then send them to tor-
consensus-health, or create another list.
>
> Will do! They're safe, the only reason I don't send them to the list is
because I'm the only person that would likely act upon them. Happy to give
it a shot.
The network team has weekly rotations. Checking for consensus health
issues could fit in the CI/Coverity rotation.
*But* consensus-health is really noisy. And people need to specifically
subscribe to get the emails. Maybe there's a better place we can put this
status?
Can we run a scheduled task in Jenkins or Travis?
(Travis can run scheduled tasks every day.)
> There's a few spots where I've created automated notifications that
follow a certain pattern...
>
> 1. X commonly breaks.
>
> 2. I create a monitor to email me when X occurs.
>
> 3. When X occurs I file a ticket with the network team.
>
> Honestly malformed descriptors are pretty minor pain point for me.
They're rare (one crops up every couple months?). I'll give tor-consensus-
health@ a shot, but I have a sinking suspicion I'll still need to file
tickets to get traction.
If we can make these failures visible, a team rotation could help.
> Another more common annoyance for me are tor regressions. Every couple
weeks the following occurs...
>
> 1. Tor pushes a regression.
>
> 2. Stem's Jenkins test failures email me.
The network team member doing the CI rotation should catch these issues.
But I bet that we are just checking for tor failures, not stem failures
due to tor.
> 3. I wait a few days to see if it gets fixed.
>
> 4. When it becomes clear a fix isn't coming I pull and compile the new
tor codebase.
>
> 5. I reproduce the test failure locally and construct reproduction steps
that use telnet to take Stem out of the loop.
>
> 6. I file a ticket with the network team to get it addressed.
>
> To the network team's credit their responsiveness when we get to #6 is
**fantastic**. Only trouble is that I'd like to take myself out of the
loop on these both (tor regressions and malformed descriptors).
>
> For malformed descriptors I'll give tor-consensus-health@ a shot, and
reopen this if I still need to file a ticket.
>
> As for tor regressions I've asked the Network team to run tor's stem
test target prior to pushing but no dice so far. Just dealt with another
this morning (#27446). Any thoughts on how we can drop me from the loop on
these?
We only recently set up the team rotations. We're going to talk about them
again in Mexico. Let's make sure we put stem and consensus-health on the
list.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27416#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs