diff --git a/tsa/meeting/2019-07-01.mdwn b/tsa/meeting/2019-07-01.mdwn index 1ac2325ff23092bf2e7688002e874ca604189f77..47786354525825122a81d34b691b8e4dc746c762 100644 --- a/tsa/meeting/2019-07-01.mdwn +++ b/tsa/meeting/2019-07-01.mdwn @@ -116,5 +116,5 @@ effective, so we'll try that next time. # Next meeting -August 5th, 1400UTC (canceled, moved to [[september|2019-09-09]]. We will try to make the meeting faster and +August 5th, 1400UTC (canceled, moved to [[september|2019-09-09]]). We will try to make the meeting faster and prepare the first two points in a pad beforehand. diff --git a/tsa/meeting/2019-09-09.mdwn b/tsa/meeting/2019-09-09.mdwn index 62b08c33dbb6b00a2812ed68732e4917ff09b27c..396813c41c9b38955cce42b790822389cbba1922 100644 --- a/tsa/meeting/2019-09-09.mdwn +++ b/tsa/meeting/2019-09-09.mdwn @@ -11,25 +11,25 @@ * catchup with Stockholm and tasks * ipsec puppet module completion (should we publish it?) - * fixed civicrm tunneling issues, hopefully (#30912) - * published blog post with updates from the previous email: https://anarc.at/blog/2019-07-30-pgp-flooding-attacks/ + * fixed civicrm tunneling issues, hopefully ([#30912](https://bugs.torproject.org/30912)) + * published blog post with updates from the previous email: <https://anarc.at/blog/2019-07-30-pgp-flooding-attacks/> * struggled with administrative/accounting stuff * contacted greenhost about DNS: they have anycast DNS with an API, but not GeoDNS, what should we do? - * RT access granting and audit (#31249, #31248), various LDAP access tickets and cleaned up gettor group - * backup documentation https://help.torproject.org/tsa/howto/backup/ https://trac.torproject.org/projects/tor/ticket/30880 + * RT access granting and audit ([#31249](https://bugs.torproject.org/31249), [#31248](https://bugs.torproject.org/31248)), various LDAP access tickets and cleaned up gettor group + * [backup documentation](https://help.torproject.org/tsa/howto/backup/) ([#30880](https://bugs.torproject.org/30880)) * tested bacula and postgresq restore procedures, specifically, you might want to get familiar with those before a catastrophe - * cleaned up services inventory (#31261) all in https://trac.torproject.org/projects/tor/wiki/org/operations/services now + * cleaned up services inventory ([#31261](https://bugs.torproject.org/31261)) all in <https://trac.torproject.org/projects/tor/wiki/org/operations/services> now * worked on getting ganeti into puppet with weasel ### August * on vacation the last week, it was awesome - * published a summary of the KNOB attack against Bluetooth (TL;DR: don't trust your BT keyboards) https://anarc.at/blog/2019-08-19-is-my-bluetooth-device-insecure/ + * published a summary of the KNOB attack against Bluetooth (TL;DR: don't trust your BT keyboards) <https://anarc.at/blog/2019-08-19-is-my-bluetooth-device-insecure/> * ganeti merge almost completed * first part of the hiera transition completed, yaaaaay! - * tested a puppet validation hook (#31226) you should install it locally, but our codebase is maybe not ready to run this server-side - * retired labs.tpo (#24956) - * retired nova.tpo (#29888) and updated the host retirement docs, especially the hairy procedure where we don't have remote console to wipe disks + * tested a puppet validation hook ([#31226](https://bugs.torproject.org/31226)) you should install it locally, but our codebase is maybe not ready to run this server-side + * retired labs.tpo ([#24956](https://bugs.torproject.org/24956)) + * retired nova.tpo ([#29888](https://bugs.torproject.org/29888)) and updated the host retirement docs, especially the hairy procedure where we don't have remote console to wipe disks ## hiro - Collecting all my snippets here https://dip.torproject.org/users/hiro/snippets @@ -43,21 +43,21 @@ ## weasel, for september, actually * Finished doing ganeti stuff. We have at least one VM now, see next point * We have a loghost now, it's called loghost01. There is a /var/log/hosts that has logs per host, and some /var/log/*all* files that contain log lines from all the hosts. We don't do backups of this host's /var/log because it's big and all the data should be elsewhere anyway. - * started doing new onionoo infra, see #31659. + * started doing new onionoo infra, see [#31659](https://bugs.torproject.org/31659). * debian point releases # What we're up to next ## anarcat - * figure out the next steps in hiera refactoring (#30020) - * ops report card, see below (#30881) - * LDAP sudo transition plan (#6367) - * followup with snowflake + TPA? (#31232) - * send root@ emails to RT, and start using it more for more things? (#31242) - * followup with email services improvements (#30608) + * figure out the next steps in hiera refactoring ([#30020](https://bugs.torproject.org/30020)) + * ops report card, see below ([#30881](https://bugs.torproject.org/30881)) + * LDAP sudo transition plan ([#6367](https://bugs.torproject.org/6367)) + * followup with snowflake + TPA? ([#31232](https://bugs.torproject.org/31232)) + * send root@ emails to RT, and start using it more for more things? ([#31242](https://bugs.torproject.org/31242)) + * followup with email services improvements ([#30608](https://bugs.torproject.org/30608)) * continue prometheus module merges - * followup on SVN decomissionning (#17202) + * followup on SVN decomissionning ([#17202](https://bugs.torproject.org/17202)) ## hiro * on vacation first two weeks of August @@ -77,7 +77,7 @@ These machines would not be accessed directly by users but would serve as backends for a) fastly, and b) our own varnish/haproxy frontends. * split onionoo backends (that run the java stuff) from frontends (that run haproxy/varnish). The backends might also want to run a varnish. Also, retire the stunnel and start doing ipsec between frontends and backends. - (that's already started, cf. #31659) + (that's already started, cf. [#31659](https://bugs.torproject.org/31659)) * start moving VMs to gnt-fsn ## ln5 @@ -89,13 +89,13 @@ # Answering the 'ops report card' -See https://trac.torproject.org/projects/tor/ticket/30881 +See <https://trac.torproject.org/projects/tor/ticket/30881> anarcat introduced the project and gave a heads up that this might mean more ticket and organizational changes. for example, we don't define "what's an emergency" and "what's supported" clearly enough. anarcat will use this process as a prioritization tool as well. # Email next steps -Brought up "the plan" to Vegas: https://trac.torproject.org/projects/tor/wiki/org/meetings/2019Stockholm/Notes/EmailNotEmail +Brought up "the plan" to Vegas: <https://trac.torproject.org/projects/tor/wiki/org/meetings/2019Stockholm/Notes/EmailNotEmail> Response was: why don't we just give everyone LDAP accounts? Everyone has PGP... @@ -103,13 +103,13 @@ We're still uncomfortable with deploying the new email service but that was agre # Do we want to run Nextcloud? -See also the discussion in https://trac.torproject.org/projects/tor/ticket/31540 +See also the discussion in <https://trac.torproject.org/projects/tor/ticket/31540> The alternatives: a. Hosted on Tor Project infrastructure, operated by Tor Project. -b. Hosted on Tor Project infrastructure, operated by Riseup. -c. Hosted on Riseup infrastructure, operated by Riseup. +a. Hosted on Tor Project infrastructure, operated by Riseup. +a. Hosted on Riseup infrastructure, operated by Riseup. We're good with B or C for now. We can't give them root so B would need to be running as UID != 0, but they prefer to handle the machine themselves, so we'll go with C for now.