[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27416 [Core Tor/Tor]: Improve descriptor validation in Tor using Stem
#27416: Improve descriptor validation in Tor using Stem
--------------------------+----------------------------------
 Reporter:  teor          |          Owner:  (none)
     Type:  defect        |         Status:  new
 Priority:  Medium        |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:  tor-dirauth   |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+----------------------------------
Comment (by atagar):
 > But the parsing check *still* won't be enough to catch all spec-
 implementation divergences. And that's ok. Sometimes we fix the spec,
 sometimes with fix tor, and sometimes we fix other parsers.
 Yup. Agreed. :P
 > Running stem as an essential part of dirauth operation is a significant
 change in tor's security model. It would require a proposal.
 Agreed, on reflection we shouldn't. In essence there's two directions we
 can take: use stem's validators to **notify (file tickets)** or **enforce
 (block malformed descriptors)**. We do the former nowadays, and should not
 do the later without a lot of thought.
 > If the checks are safe to make public, then send them to tor-consensus-
 health, or create another list.
 Will do! They're safe, the only reason I don't send them to the list is
 because I'm the only person that would likely act upon them. Happy to give
 it a shot.
 There's a few spots where I've created automated notifications that follow
 a certain pattern...
 1. X commonly breaks.
 2. I create a monitor to email me when X occurs.
 3. When X occurs I file a ticket with the network team.
 Honestly malformed descriptors are pretty minor pain point for me. They're
 rare (one crops up every couple months?). I'll give tor-consensus-health@
 a shot, but I have a sinking suspicion I'll still need to file tickets to
 get traction.
 Another more common annoyance for me are tor regressions. Every couple
 weeks the following occurs...
 1. Tor pushes a regression.
 2. Stem's Jenkins test failures email me.
 3. I wait a few days to see if it gets fixed.
 4. When it becomes clear a fix isn't coming I pull and compile the new tor
 codebase.
 5. I reproduce the test failure locally and construct reproduction steps
 that use telnet to take Stem out of the loop.
 6. I file a ticket with the network team to get it addressed.
 To the network team's credit their responsiveness when we get to #6 is
 **fantastic**. Only trouble is that I'd like to take myself out of the
 loop on these both (tor regressions and malformed descriptors).
 For malformed descriptors I'll give tor-consensus-health@ a shot, and
 reopen this if I still need to file a ticket.
 As for tor regressions I've asked the Network team to run tor's stem test
 target prior to pushing but no dice so far. Just dealt with another this
 morning (#27446). Any thoughts on how we can drop me from the loop on
 these?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27416#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs