Deploying Simple Bandwidth Scanner¶
To run sbws is needed:
A machine to run the scanner.
One or more destination (s) that serve a large file.
Both the scanner
and your the destination
(s) should be on fast,
well connected machines.
Destination requirements¶
TLS support to avoid HTTP content caches at the various exit nodes.
Certificates can be self-signed.
A fixed IP address or a domain name.
Bandwidth: at least 12.5MB/s (100 Mbit/s).
Network traffic: around 12-15GB/day.
An HTTP Web server, see next subsection.
HTTP server requirements¶
If the consensus parameter
bwscanner_cc
is not set or has a value lower than 2:A Web server installed and running that supports HTTP GET, HEAD and Range (RFC 7233) requests.
Apache
HTTP Server andNginx
support them.It also needs to allow
`keep-alive
, in order to reuse connections between the sbws HEAD request and the several GET ones.Note
if the server is configured with
keep-alive
timeout, it’d need to be at least the same timeout as in the sbws HTTP requests, which is 10 seconds by default (http_timeout
variable in the configuration file, see more about in the next section).It also needs a large file; at the time of writing, at least 1 GiB in size It can be created running:
head -c $((1024*1024*1024)) /dev/urandom > 1GiB
If the consensus parameter
bwscanner_cc
has value 2:A Web server installed and running that supports HTTP POST either:
via
Content-Type multipart/form-data
(RFC 2388) as a file upload.via
Content-Type multipart/form-data
RFC 2388 as a raw (text) field upload.
If your Web server supports HTTP MQTT binary but not the 2 previous methods, open an issue so that we implement the MQTT client part in the scanner.
Example configurations:
Apache supporting HTTP GET and the three POST methods:
<Location "/"> AllowOverride None Order Deny,Allow Deny from All </Location> <Location "/1G"> Allow from All </Location> <Location "/postpath"> Allow from All </Location>
And in the directory of static files served:
head -c $((1024*1024*1024)) /dev/urandom > 1G echo OK > postpath
nginx supporting the three POST methods:
location /postpath { root /same/path/to/normal/directory; client_max_body_size 1G; # should not be necessary, but just in case nginx tries to litter: client_body_in_file_only clean; # this is a really horrible hack: error_page 405 =200 $uri; }
And in the directory of static files served:
echo OK > postpath
You can test your configuration running:
HEAD request:
curl https://bwauth.httpd.ip/1G -i -H "Range: bytes=0-1023"
It should reply:
HTTP/1.1 206 Partial Content Accept-Ranges: bytes Content-Length: 1024 Content-Range: bytes 0-1023/1073741824
GET request:
curl -v https://bwauth.httpd.ip/1G
It should reply:
< HTTP/1.1 200 OK < Accept-Ranges: bytes < Content-Length: 1073741824
POST request:
dd if=/dev/zero of=post-20MB.zero bs=1k count=20480 curl -F "sbwstest=@post-20MB.zero" https://bwauth.httpd.ip/postpath -O curl -F "sbwstest=<post-20MB.zero" https://bwauth.httpd.ip/postpath -O
In the Xferd column it should show
20.0M
:% Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 20.0M 100 265 100 20.0M 4 346k 0:01:06 0:00:59 0:00:07 64
If you want, use a Content delivery network (CDN) in order to make the destination IP closer to the scanner exit.
Configuring an HTTP server destination
in a testing network¶
For development and integration tests, we use chutney to bootstrap a Tor
network and a minimal HTTP server in localhost. sbws
only accepts the
HTTP
scheme (without TLS) for the destination, when its address is
127.0.0.1
. In this case, sbws
also detects that
the Tor network is a TestingTorNetwork
and stops after the first loop
.
If you need an HTTP server running in other address other than localhost, you would need it to support TLS.
For this, you can create a self-signed certificate and configure sbws
to
use it by adding the certificate to its verify configuration option
scanner setup¶
Note
To facilitate debugging, it is recommended that the system timezone is set to UTC.
To set the timezone to UTC in Debian:
apt-get --reinstall install tzdata
ln -sf /usr/share/zoneinfo/UTC /etc/localtime
update-initramfs -u
Install sbws according to INSTALL.rst (in the local directory or Tor Project Gitlab) or INSTALL.html (local build or Read the Docs).
To run the scanner
it is mandatory to create a configuration file with at
least one destination
.
It is recommended to set several destinations
so that the scanner
can
continue if one fails.
If sbws
is installed from the Debian package, then create the configuration
file in /etc/sbws/sbws.ini
.
You can see an example with all the possible options here, note that you don’t
need to include all of that and that everything that starts with #
and
;
is a comment:
# Minimum configuration that needs to be customized
[scanner]
# ISO 3166-1 alpha-2 country code where the scanner is located.
# Default AA, to detect it was not edited.
country = AA
# A human-readable string with chars in a-zA-Z0-9 to identify the dirauth
# nickname that will publish the BandwidthFiles generated from this scanner.
# Default to a non existing dirauth_nickname to detect it was not edited.
dirauth_nickname = dirauth_nickname
[destinations]
# With several destinations, the scanner can continue even if some of them
# fail, which can be caused by a network problem on their side.
# If all of them fail, the scanner will stop, which
# will happen if there is network problem on the scanner side.
# A destination can be disabled changing `on` by `off`
foo = on
[destinations.foo]
# the domain and path to the 1GB file or POST URL.
url = https://example.com/does/not/exist.bin
# Whether to verify or not the TLS certificate. Default True
verify = False
# ISO 3166-1 alpha-2 country code where the Web server destination is located.
# Default AA, to detect it was not edited.
# Use ZZ if the location is unknown (for instance, a CDN).
country = ZZ
## The following logging options are set by default.
## There is no need to change them unless other options are preferred.
; [logging]
; # Whether or not to log to a rotating file the directory paths.log_dname
; to_file = yes
; # Whether or not to log to stdout
; to_stdout = yes
; # Whether or not to log to syslog
; # NOTE that when sbws is launched by systemd, stdout goes to journal and
; # syslog.
; to_syslog = no
; # Level to log at. Debug, info, warning, error, critical.
; # `level` must be set to the lower of all the handler levels.
; level = debug
; to_file_level = debug
; to_stdout_level = info
; to_syslog_level = info
; # Format string to use when logging
; format = %(module)s[%(process)s]: <%(levelname)s> %(message)s
; # verbose formatter useful for debugging
; to_file_format = %(asctime)s %(levelname)s %(threadName)s %(filename)s:%(lineno)s - %(funcName)s - %(message)s
; # Not adding %(asctime)s to to stdout since it'll go to syslog when using
; # systemd, and it'll have already the date.
; to_stdout_format = ${format}
; to_syslog_format = ${format}
# To disable certificate validation, uncomment the following
# verify = False
If sbws
is installed from the sources as a non-root user then create the
configuration file in ~/.sbws.ini
.
More details about the configuration file can be found in
./docs/source/man_sbws.ini.rst
(in the local directory or Tor Project
Gitlab) or man_sbws.ini.html (local build or Read the Docs) or
man sbws.ini
(system package).
generator setup¶
The Debian package from version 1.6.0 replaces cron jobs by systemd.timer
to run the generator
and the cleanup
command to clean the old data.
After the package is installed, it’s needed to enable and start the timers (Debian policy is not to start/enable services by default):
systemctl enable --now sbws_cleanup.timer
systemctl enable --now sbws_generate.timer
To ensure they are enabled run:
systemctl list-timers
It should show the next time the generator
or cleanup timer is going to
run:
Wed 2023-10-18 08:35:00 GMT 19min left Wed 2023-10-18 07:35:02 GMT 40min ago sbws_generate.timer sbws_generate.service
You can check that the timer service is working by invoking it directly:
systemctl start sbws_generate.service
If sbws is installed in some other way, you would need to create the timers or cron jobs. Example cron jobs:
35 * * * * sbws /usr/local/bin/sbws -c /etc/sbws/sbws.ini generate
05 0 * * * sbws /usr/local/bin/sbws -c /etc/sbws/sbws.ini cleanup
You can modify the timers or cron jobs to get emails on failures.
For the cron jobs, use MAILTO
, for the timers, use OnFailure
to call an
email service.
If the cron job is configured to send Email alerts on errors, it’s probably
better to configure the log level to ERROR
instead of WARNING
.
At level WARNING
, the first days, the generator
will log every hour
that it hasn’t reached enough percentage of relays to report.
After some days, if the scanner is located near fasts exits, it would also log
every hour that it is reporting more than the 50% of the consensus bandwidth.
The log level can be changed in the configuration file, for example:
to_stdout_level = error
This setup will affect both to the generator
and the scanner
, so for
Email alerts, it’s probably more convenient to configure it from the command
line, for example:
/usr/local/bin/sbws --log-level error generate
See also ./docs/source/man_sbws.rst
(in the local directory or Tor Project
Gitlab) or man_sbws.html (local build or Read the Docs) or man sbws
(system package).
Troubleshooting¶
See ./docs/source/troubleshooting.rst
(in the local directory or Tor Project
Gitlab) or Troubleshooting.html (local build or Read the Docs)