I'm running a Tor relay on a dynamic IP which changes every day. At the moment
my node is marked as stable and guard which AFAIK shouldn't happen as it isn't
stable. I got the information from https://trunk.torstatus.kgprog.com:444/.
This may be related to bug #969 (moved) which was marked as fixed.
Thanks,
Simon
[Automatically added by flyspray2trac: Operating System: All]
Trac: Username: rudis
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Assigning this one to Karsten for investigation, since he seems to be Keeper of Networkstatus Deltas these days. Karsten, please un-assign it if it isn't up your alley.
Trac: Owner: N/Ato karsten Status: new to assigned Description: Hi,
I'm running a Tor relay on a dynamic IP which changes every day. At the moment
my node is marked as stable and guard which AFAIK shouldn't happen as it isn't
stable. I got the information from https://trunk.torstatus.kgprog.com:444/.
This may be related to bug #969 (moved) which was marked as fixed.
Thanks,
Simon
[Automatically added by flyspray2trac: Operating System: All]
to
Hi,
I'm running a Tor relay on a dynamic IP which changes every day. At the moment
my node is marked as stable and guard which AFAIK shouldn't happen as it isn't
stable. I got the information from https://trunk.torstatus.kgprog.com:444/.
This may be related to bug #969 (moved) which was marked as fixed.
Thanks,
Simon
[Automatically added by flyspray2trac: Operating System: All]
Attached is a graph on the fraction of relays on dynamic and static IP addresses obtaining the Guard and/or Stable flag. I'm considering a relay to be on a dynamic IP address if it's listed with 4 or more different IP addresses in the past 12 months.
So, only very few relays on dynamic IP addresses obtain the Guard flag, but up to 1/4 of them get the Stable flag. What did we expect these two fractions to be? Something close to zero?
I can look more at the details if someone tells me what to look for. Maybe there's a better way to distinguish static and dynamic IP addresses?
And yes, investigating these things is easy for me. If there are other bugs that need similar analysis, feel free to assign them to me.
Having 4 IP addresses in 12 months isn't a big deal as far as stability is concerned. Having 20 or more -- or having many IPs that were held for less than a week -- would probably pose more of a problem for stability. Are there many Stable nodes like that?
Fraction of relays on static/dynamic IP addresses obtaining the Guard/Stable flag where dynamic IP address means 4 or more different IP addresses each assigned for less than 1 week
I changed the criterion for calling an IP address dynamic by requiring 4 or more different IP addresses each assigned for less than 1 week. This reduces the number of relays classified as being on a dynamic IP address from 10273 to 8001 in the same time period. The graph changes a bit, but the number of relays on dynamic IP addresses having the Stable or Guard flag is still not close to zero. Is this expected?
Nick suggests there's a bug where we don't reset wfu/mtbf when the relay's IP address changes. That sounds quite plausible: if it's recently reachable every time we check whether we found it reachable, we'll never mark it not-running, so we'll never register a state change.
Triage: this bug should not block 0.2.2.x-rc. When we finally get around to fixing the wfu/mtbf bugs (which may well involve a proposal and a new design), we can fix them on the authority side, so there's no need to hold up the new stable.
So to clarify, the desired behavior is that when your IP changes, it should be as if you just shut down your router and came back as a new router? That seems suboptimal.
Perhaps instead if your IP changes, we should treat you as having been down since the last time you were observed to be up. This will count as downtime for the purpose of resetting the current MTBF run, and also take a little chunk out of WFU. But maybe it doesn't limit WFU enough. Authorities learn about IP changes more frequently than clients, after all, so an IP change that is only 15 minutes long from the authorities' perspective will be a couple hours from the clients' perspective.
So maybe we should treat an IP change as if it were equal to automatic downtime of the same length as the average propagation time of a server descriptor to a client?
It does appear to me that average propagation time is the right thing here. But what is the average propagation time? This is likely to be two different things when microdescs and normal descriptors are served in parallel, and we don't want to punish the IP-changing relay as much.