Hi,
No, we fixed some obvious torflow bugs and design flaws. Here are some details: Let's talk engineering tradeoffs. sbws had a few conflicting goals: * create a modern bandwidth scanner implementation * produce results that are similar to torflow * be ready to deploy in 2019 Here's how we resolved those tradeoffs: * use modern designs, libraries, and protocols when building sbws * compare sbws results against torflow, and identify any issues: * when torflow is obviously wrong, do something better in sbws * when sbws is obviously wrong, log a bug against sbws, and triage it * when the results differ by a small amount, accept that difference See these tickets for more details: Here are some network health checks we are doing as we deploy sbws: Here are some FAQs about the design, and the bandwidth file spec: It would be great to have more design documentation, but keeping that documentation up to date is a lot of work. And we needed to deliver working code, too.
Relays can get stuck in a slow torflow scanner partition, and never improve their measurements. But in sbws, each relay is measured against a random faster relay. sbws tries to choose relays that are at least 2x faster than the target. So some stuck relay bandwidths should improve under sbws, as long as we have enough sbws instances (about half, I think). That said, there are still some bugs in sbws. Some of those bugs were copied from torflow. Others are new bugs. sbws has detailed diagnostics that will help us chase down and fix these bugs. And we can also make design changes. But let's stabilise sbws first, and fix any high-impact bugs. T |
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev