Opened 8 years ago

Closed 8 years ago

Last modified 8 years ago

#5088 closed defect (wontfix)

CVS with platform strings of currently running relays can't be downloaded.

Reported by: bastik Owned by:
Priority: Medium Milestone:
Component: Metrics/Website Version:
Severity: Keywords: CVS platform strings
Cc: bastik Actual Points:
Parent ID: Points:
Reviewer: Sponsor:

Description

I am unable to download the mentioned CVS file, with different browsers (FF 10, 11 beta and IE 9) on windows. Other CVS files can be downloaded.

I click the link on the metrics portal and nothing happens.
https://metrics.torproject.org/csv/current-platform-strings.csv

Days after Tor 0.2.3.11-alpha was announced (23. Jan 2012) on the mailing list I wanted to check how many users compiled it.

Since now there are no binary releases (for windows), so I came back from time to time to download the CVS (platform strings) but nothing happens.

Child Tickets

Change History (3)

comment:1 Changed 8 years ago by karsten

Resolution: wontfix
Status: newclosed

You're right, that URL doesn't work so well anymore since we partitioned the statusentry table in the database. I tried to tweak the query, but the fix that worked elsewhere didn't work here. I'm going to take the CSV file off the metrics website. It's a job for TorStatus, not for Metrics anyway.

Here's a workaround: Download the JSON file of running relays and bridges from Onionoo, strip off bridges, and grep for platform lines:

$ curl http://85.214.195.203/details/running > running
$ sed '/bridges_published/q' running | grep "platform" | less

So, I'm not fixing this bug. Thanks for reporting it anyway!

comment:2 Changed 8 years ago by bastik

Thank you. Apparently no fix needed.

As assumed no windows relay has picked up the latest alpha. Most certainly, due to the lack of compiling tools, as there are none included.

Windows doesn't know grep, but thankfully there's a windows version of it.

I'm confused.
"Onionoo is (...) to learn about currently running Tor relays and bridges"

From what I can tell, the IP addresses are modified. At least the first part.
I can't read code well enough to figure out how it's modified. Also I'm unable to figure out what's the hashed fingerprint unless there's some kind of salt involved.

I'm unable to find a currently running bridge I know of (IP:PORT and fingerprint), which wasn't my goal. I looked for it because the JSON might include it.

Is there anything to read about Onionoo? (This is not the right place to "talk" about it.) Please don't write any long explanations I don't wanna waste your time. (It's not worth the time)

comment:3 Changed 8 years ago by karsten

You can learn more about sanitized bridge descriptors with their hashed fingerprints and 10.x.x.x IP addresses here.

More information about Onionoo is available here and here.

If you have more questions feel free to ask on #tor-dev or mail to tor-assistants@….

Note: See TracTickets for help on using tickets.