Fallback Scripts issueshttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues2021-09-16T14:48:14Zhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/26502Stop using the fallback blacklist, and delete it2021-09-16T14:48:14ZteorStop using the fallback blacklist, and delete itWe require relay operators to opt-in to being fallbacks, and we won't ever switch to opt-out. (See legacy/trac#24789.)
So we don't need the fallback blacklist any more.
We should stop loading the blacklist in the script, then delete it.We require relay operators to opt-in to being fallbacks, and we won't ever switch to opt-out. (See legacy/trac#24789.)
So we don't need the fallback blacklist any more.
We should stop loading the blacklist in the script, then delete it.Tor: 0.3.5.x-finalhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/309744-5. Announce the new fallback list, and tell downstream maintainers that it ...2021-06-19T09:13:31Zteor4-5. Announce the new fallback list, and tell downstream maintainers that it has changedHere are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
This ticket covers steps 4 and 5.Here are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
This ticket covers steps 4 and 5.David Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/30971Rebuild the fallback list in late 2019 or early 20202020-07-24T17:25:50ZteorRebuild the fallback list in late 2019 or early 2020Late in 2019, or early in 2020, we should rebuild the fallback list again.
We usually do this when 25% or more go down.
(When 25% of fallbacks are down, a warning is logged daily in #tor-bots on IRC, and via email to the fallback mainta...Late in 2019, or early in 2020, we should rebuild the fallback list again.
We usually do this when 25% or more go down.
(When 25% of fallbacks are down, a warning is logged daily in #tor-bots on IRC, and via email to the fallback maintainers.)
Here are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
See the child tickets for each step.Tor: 0.4.4.x-finalDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/34244Fallback details changed for 1938EBACBB1A7BFA888D9623C90061130E63BB3F2020-07-23T14:08:10ZAlexander Færøyahf@torproject.orgFallback details changed for 1938EBACBB1A7BFA888D9623C90061130E63BB3FFrom tor-relays@lists.torproject.org:
```
Date: Sun, 17 May 2020 07:53:52 +0000
From: Anders Burmeister <...>
To: "tor-relays@lists.torproject.org" <tor-relays@lists.torproject.org>
Subject: [tor-relays] EOL 1938EBACBB1A7BFA888D9623C900...From tor-relays@lists.torproject.org:
```
Date: Sun, 17 May 2020 07:53:52 +0000
From: Anders Burmeister <...>
To: "tor-relays@lists.torproject.org" <tor-relays@lists.torproject.org>
Subject: [tor-relays] EOL 1938EBACBB1A7BFA888D9623C90061130E63BB3F FallbackDir
FallbackDir
1938EBACBB1A7BFA888D9623C90061130E63BB3F
Expired
rest of the family happily up and running.
/anders
```
The relay is still running though.https://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/309732-3. Generate a new fallback list in 2019-2020 and backport it to all support...2020-07-23T14:06:01Zteor2-3. Generate a new fallback list in 2019-2020 and backport it to all supported Tor versionsHere are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
This ticket covers steps 2 and 3.Here are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
This ticket covers steps 2 and 3.https://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/309720-1. Run an opt-in process for relay operators to become fallbacks in 2019-20202020-07-23T14:05:43Zteor0-1. Run an opt-in process for relay operators to become fallbacks in 2019-2020Here are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
This ticket covers steps 0 and 1.Here are the instructions for running a rebuild:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
This ticket covers steps 0 and 1.https://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/29100Update src/app/config/fallback_dirs.inc to ../tor/src/app/config/fallback_dir...2020-07-13T19:16:27ZteorUpdate src/app/config/fallback_dirs.inc to ../tor/src/app/config/fallback_dirs.inc post-splitThere are a bunch of references to `src/app/config/fallback_dirs.inc` for check_existing mode, and in the comments.
We should update them to `../tor/src/app/config/fallback_dirs.inc` post-split.There are a bunch of references to `src/app/config/fallback_dirs.inc` for check_existing mode, and in the comments.
We should update them to `../tor/src/app/config/fallback_dirs.inc` post-split.https://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/19480Avoid errors during fallback selection when there are no fallbacks2020-06-27T14:11:48ZteorAvoid errors during fallback selection when there are no fallbacksThis issue is fixed as part of legacy/trac#19071, I just needed a bug number.This issue is fixed as part of legacy/trac#19071, I just needed a bug number.Tor: 0.2.8.x-finalteorteorhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20010modifications of relay(s) on fallback whitelist2020-06-27T14:11:48ZTracmodifications of relay(s) on fallback whitelist```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello teor,
I currently have two relays in the fallback whitelist (niij01 230A8B2A8BA861210D9B4BA97745AEC217A94207 and niij02 0B85617241252517E8ECF2CFC7F4C1A32DCD153F). I have some u...```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello teor,
I currently have two relays in the fallback whitelist (niij01 230A8B2A8BA861210D9B4BA97745AEC217A94207 and niij02 0B85617241252517E8ECF2CFC7F4C1A32DCD153F). I have some updates/questions:
1. I have added IPv6 addresses for these two relays, is there anything I need to do to update them on the fallback list?
2. I have another fast, stable relay in the family of these 2 relays, that can be added (niij03 A9406A006D6E7B5DA30F2C6D4E42A338B5E340B2) to the fallback.
3. Do the IP addresses for these relays need to remain the same indefinitely? I was thinking of changing hosts (fingerprint would remain the same), but if changing the IP addresses causes issues, I will keep them on their current host.
Thanks, niij
-----BEGIN PGP SIGNATURE-----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=0wQz
-----END PGP SIGNATURE-----
```
**Trac**:
**Username**: niijTor: 0.2.9.x-finalteorteorhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20170Backport latest fallback list to 0.2.8 and 0.2.92020-06-27T14:11:48ZteorBackport latest fallback list to 0.2.8 and 0.2.9I'm generating a new list of fallback directory mirrors for release 0.2.9 in legacy/trac#18828.
We have a few options for dealing with the 0.2.8 list:
* comment-out any broken fallbacks,
* backport the 0.2.9 list,
* do nothing.
I would...I'm generating a new list of fallback directory mirrors for release 0.2.9 in legacy/trac#18828.
We have a few options for dealing with the 0.2.8 list:
* comment-out any broken fallbacks,
* backport the 0.2.9 list,
* do nothing.
I would prefer to have the same src/or/fallback_dirs.inc in every (relevant) Tor release, assuming we do another 0.2.8 series release.
This is consistent with how we handle directory authorities and geoip.
Otherwise it becomes hard to check multiple fallback lists at once.
But I could be convinced to go with either of the other options.Tor: 0.2.8.x-finalteorteorhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20173Tell 0.2.9 fallback directory operators that their relays are on the list2020-06-27T14:11:48ZteorTell 0.2.9 fallback directory operators that their relays are on the listThank them, and remind them to keep their relay details the same.
I am hoping the community team can help me out with this, if I provide a list.Thank them, and remind them to keep their relay details the same.
I am hoping the community team can help me out with this, if I provide a list.teorteorhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20174Automate checking existing fallbacks2020-06-27T14:11:48ZteorAutomate checking existing fallbacksI use a manual process to check existing fallbacks. It would be great if the updateFallbackDirs.py script would automatically read src/or/fallback_dirs.inc, and check each fallback for errors.
For details, see:
https://trac.torproject.o...I use a manual process to check existing fallbacks. It would be great if the updateFallbackDirs.py script would automatically read src/or/fallback_dirs.inc, and check each fallback for errors.
For details, see:
https://trac.torproject.org/projects/tor/wiki/doc/UpdatingFallbackDirectoryMirrors
I think it can go in 0.3.0Tor: 0.3.0.x-finalhaxxpophaxxpophttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20175Allow the fallback script to ignore temporary IPv6 addresses2020-06-27T14:11:48ZteorAllow the fallback script to ignore temporary IPv6 addressesWhen updateFallbackDirs.py checks relay addresses, it makes sure that the IPv4 and IPv6 addresses and ports match the relay's whitelist entry.
If a relay's IPv6 address is temporary, it should not be included in the whitelist.
But this...When updateFallbackDirs.py checks relay addresses, it makes sure that the IPv4 and IPv6 addresses and ports match the relay's whitelist entry.
If a relay's IPv6 address is temporary, it should not be included in the whitelist.
But this means the relay will never be selected, because its descriptor has an IPv6 address, and that address doesn't match the (missing) address in the whitelist.
We should add a way to say ipv6=ignored or something.Tor: unspecifiedhaxxpophaxxpophttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20177When checking existing fallbacks, report those fallbacks at warning log level2020-06-27T14:11:47ZteorWhen checking existing fallbacks, report those fallbacks at warning log levelWhen the fallback script excludes some relays, it only logs at info level. This is usually what we want, but when checking existing fallbacks, it would be great to see any message about those fallbacks at WARNING log level.
This would m...When the fallback script excludes some relays, it only logs at info level. This is usually what we want, but when checking existing fallbacks, it would be great to see any message about those fallbacks at WARNING log level.
This would make it easier to work out why fallbacks are broken.Tor: unspecifiedhaxxpophaxxpophttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20178The fallback update script should log stem connection errors at warning level2020-06-27T14:11:47ZteorThe fallback update script should log stem connection errors at warning levelCurrently, they're logged at info-level, in order to filter out the "connecting to" messages. It would be great to keep those at info level, and log the "error connecting" messages at WARNING level.Currently, they're logged at info-level, in order to filter out the "connecting to" messages. It would be great to keep those at info level, and log the "error connecting" messages at WARNING level.Tor: unspecifiedhaxxpophaxxpophttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20190Remove broken fallbacks from the 0.2.8 list2020-06-27T14:11:47ZteorRemove broken fallbacks from the 0.2.8 listPlease merge my branch broken-028-fallbacks to both 0.2.8 and master.
It comments-out fallbacks that have broken since I last checked in just before 0.2.8.6.Please merge my branch broken-028-fallbacks to both 0.2.8 and master.
It comments-out fallbacks that have broken since I last checked in just before 0.2.8.6.Tor: 0.2.8.x-finalteorteorhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20192When outputting potential new fallbacks, blacklist the whitelist2020-06-27T14:11:47ZteorWhen outputting potential new fallbacks, blacklist the whitelistWhen we look for potential new fallback directory mirrors, we want to ignore existing whitelisted fallbacks, as well as the blacklist.When we look for potential new fallback directory mirrors, we want to ignore existing whitelisted fallbacks, as well as the blacklist.Tor: unspecifiedhaxxpophaxxpophttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20539Make sure fallback directories aren't running buggy versions / can deliver a ...2020-06-27T14:11:47ZteorMake sure fallback directories aren't running buggy versions / can deliver a recent consensusAfter legacy/trac#20499, we should reject fallback directories that deliver a consensus outdated by more than N hours, where N is one of [1, 2, 3].After legacy/trac#20499, we should reject fallback directories that deliver a consensus outdated by more than N hours, where N is one of [1, 2, 3].https://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20876Avoid contacting fallback operators who are unlikely to be accepted2020-06-27T14:11:47ZteorAvoid contacting fallback operators who are unlikely to be acceptedAfter we automatically calculate the fallback threshold in legacy/trac#20192, it would be great to update that threshold based on whether the operator would be selected if they opted-in.After we automatically calculate the fallback threshold in legacy/trac#20192, it would be great to update that threshold based on whether the operator would be selected if they opted-in.Tor: unspecifiedhttps://gitlab.torproject.org/tpo/core/fallback-scripts/-/issues/20877Fix a bug in updateFallbackDirs.py's comment handling2020-06-27T14:11:47ZteorFix a bug in updateFallbackDirs.py's comment handlingTurns out we weren't returning the comment string. Oops!
Bugfix on 99983432 in tor-0.2.8.3-alpha.Turns out we weren't returning the comment string. Oops!
Bugfix on 99983432 in tor-0.2.8.3-alpha.teorteor