We can rely on Onionoo to tell us when relay fingerprints or addresses change, so we don't need to do an exact match.
But listing fingerprints, addresses and ports in the whitelist is useful so that we know what a relay operator originally asked for.
Fuzzy matching simplifies maintaining the fallback whitelist, because we don't have to ask operators to update their relay details. (Or ask if those details are permanent.)
We'll still need to check and warn if fallbacks don't have a DirPort. At least until stem gets ORPort support (#18856 (closed)), and we modify Tor and the script to accept relays without DirPorts (#19129 (moved)).
8/150 = 5% of fallbacks are currently down.
https://consensus-health.torproject.org/graphs.html
At this rate, it will be 2019 before we reach our 25% failure threshold.
So we don't need to do a fallback rebuild in 0.3.4.
Trac: Milestone: Tor: 0.3.4.x-final to Tor: 0.3.5.x-final
We don't need to do this ticket as part of the fallback rebuild, but we can if we want to.
(It might be easier to ignore changed addresses, than update all the changed addresses in the whitelist.)
Trac: Milestone: Tor: 0.3.5.x-final to Tor: unspecified
Trac: Summary: Just have relay fingerprints in the fallback whitelist to Ignore addresses in the fallback whitelist Description: We can rely on Onionoo to tell us when relay addresses change, so we don't need to record or check them.
This simplifies maintaining the fallback whitelist, and also simplifies the script.
We should probably still put the full details in the blacklist, but that's rare. We can use generateFallbackDirLine.py for that.
to
We can rely on Onionoo to tell us when relay addresses change, so we don't need to check them.
But listing addresses is useful when fingerprints change.
This simplifies maintaining the fallback whitelist, and also simplifies the script.
We should probably still put the full details in the blacklist, but that's rare. We can use generateFallbackDirLine.py for that.
Trac: Description: We can rely on Onionoo to tell us when relay addresses change, so we don't need to check them.
But listing addresses is useful when fingerprints change.
This simplifies maintaining the fallback whitelist, and also simplifies the script.
We should probably still put the full details in the blacklist, but that's rare. We can use generateFallbackDirLine.py for that.
to
We can rely on Onionoo to tell us when relay addresses change, so we don't need to check them.
But listing addresses is useful when fingerprints change.
This simplifies maintaining the fallback whitelist, and also simplifies the script.
Hi imnotbad, if you're looking for something to work on while #26502 (moved) is being reviewed, you could try this ticket.
We just want to read the id= part of every line from the fallback list, and ignore the addresses and ports.
Then when we match against the whitelist, we just want to check the id.
Trac: Description: We can rely on Onionoo to tell us when relay addresses change, so we don't need to check them.
But listing addresses is useful when fingerprints change.
This simplifies maintaining the fallback whitelist, and also simplifies the script.
We can rely on Onionoo to tell us when relay fingerprints or addresses change, so we don't need to do an exact match.
But listing fingerprints, addresses and ports in the whitelist is useful so that we know what a relay operator originally asked for.
Fuzzy matching simplifies maintaining the fallback whitelist, because we don't have to ask operators to update their relay details. (Or ask if those details are permanent.)
We deleted the blacklist in #26502 (moved). Keywords: N/Adeleted, s8-bootstrap added Sponsor: N/Ato Sponsor8-can Status: assigned to needs_review Actualpoints: N/Ato 0.5 Summary: Ignore addresses in the fallback whitelist to Fuzzy match the fallback whitelist Milestone: Tor: 0.3.5.x-final to Tor: 0.4.0.x-final