Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network

2016-01-14 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, I think the solution to change the consensus format - section 3.3 is by far superior vs changing the ports on directory authorities or disabling old link protocols at relays side. Changing the consensus format is the cleanest way to do it an

Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network

2016-01-14 Thread Nick Mathewson
On Thu, Jan 7, 2016 at 12:12 PM, Nick Mathewson wrote: > [This is a significantly revised version of the last version of this > proposal draft, sent here for comment. > > The last version of this draft was > https://lists.torproject.org/pipermail/tor-dev/2015-September/009587.html > . This is mor

Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.

2016-01-14 Thread David Goulet
On 14 Jan (11:18:26), Nick Mathewson wrote: > So, one of the longstanding problems with Tor's (change) proposal > system has been that proposals sit around for a long time without > sufficient discussion or approval. When they're about to be > implemented, we do an informal "hey did anybody look a

[tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.

2016-01-14 Thread Spencer
Hi, Nick Mathewson: proposals sit around for a long time Is there a summarized visualization of these, or is it sifting through emails and tickets? contribute usefully to discussions, I will prioritize your nominations [for proposals] more Sounds fair and balanced. Wordlife, Spencer

Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh

2016-01-14 Thread Damian Johnson
> What you could try, though, is extend Zoossh to parse tarballs rather > than directories. This is more than 2 times faster in metrics-lib, > and it doesn't clutter your hard disk with thousands or millions of > tiny files. For what it's worth processing tarballs rather than flat files made a hu

Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters

2016-01-14 Thread David Goulet
On 14 Jan (08:07:47), Mike Perry wrote: > Tim Wilson-Brown - teor: > > > On 13 Jan 2016, at 00:53, Mike Perry wrote: > > > 1. Overview > > > > > > For padding overhead due to Proposals 251 and 254, and changes to hidden > > > service path selection in Proposal 247, it will be useful to be able to

Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh

2016-01-14 Thread Damian Johnson
Oh, forgot to talk about compression. You can run the stem script against compressed tarballs but python didn't add lzma support until python 3.3... https://stem.torproject.org/faq.html#how-do-i-read-tar-xz-descriptor-archives I suppose we could run over bz2 or gz tarballs, or upgrade python. But

Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters

2016-01-14 Thread Nick Mathewson
On Tue, Jan 12, 2016 at 8:53 AM, Mike Perry wrote: > This proposal aims to allow us to load balance properly between Guard, > Middle, and Exit nodes with the addition of padding traffic to the > network. > > Canonical proposal current lives in my load_balancing-squashed branch: > https://gitweb.to

[tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.

2016-01-14 Thread Nick Mathewson
So, one of the longstanding problems with Tor's (change) proposal system has been that proposals sit around for a long time without sufficient discussion or approval. When they're about to be implemented, we do an informal "hey did anybody look at that?" check, but that's not really good enough.

Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters

2016-01-14 Thread Mike Perry
Tim Wilson-Brown - teor: > > On 13 Jan 2016, at 00:53, Mike Perry wrote: > > 1. Overview > > > > For padding overhead due to Proposals 251 and 254, and changes to hidden > > service path selection in Proposal 247, it will be useful to be able to > > specify a pair of parameters that represents th

[tor-dev] Fwd: Orbot roadmap feedback

2016-01-14 Thread Spencer
Hi, Georg Koppen: how do you convey the problem that all the other users of the Tor network could be affected You can always say that and link to the relevant documentation. You can also visualize the affect their participation in the network has, inherently addressing this issue as a resu

Re: [tor-dev] Fwd: Orbot roadmap feedback

2016-01-14 Thread Georg Koppen
Nathan Freitas: > On Tue, Jan 12, 2016, at 10:48 AM, Georg Koppen wrote: >> Nathan Freitas: >>> - Overall improved configuration / settings UI to make tuning Orbot a >>> better, simpler experience... this is an expansion of the new exit >>> country selector in Orbot v15.1, but also includes managin

Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh

2016-01-14 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 13/01/16 21:01, Philipp Winter wrote: > On Wed, Jan 13, 2016 at 05:47:03PM +0100, Karsten Loesing wrote: >> Do the Zoossh results there look plausible? > > I'm surprised that descriptor parsing is so slow, but I think the > results are plausible,

Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh

2016-01-14 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 13/01/16 20:42, Damian Johnson wrote: >> This was Stem commit c01a9cda4e7699c7f4bd642c8e81ed45aab7a29b >> and Python version 2.7.10. > > Great, thanks! Also what was the metrics-lib and zoossh commits? metrics-lib: 8767f3e3bb8f6c9aa8cdb4c9fb0e9f2b

Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points

2016-01-14 Thread Michael Rogers
On 13/01/16 20:42, s7r wrote: > After prop 250, a malicious HSDir can not do so much, but a merged > HSDir + IP can for example kill the circuit and force the hidden > service to rebuild it. Under the current design, we retry for some > times and give up if an introduction point is unreliable, but