Deploying Simple Bandwidth Scanner

To run sbws is needed:

Both the scanner and your the destination (s) should be on fast, well connected machines.

Destination requirements

  • TLS support to avoid HTTP content caches at the various exit nodes.

  • Certificates can be self-signed.

  • A fixed IP address or a domain name.

  • Bandwidth: at least 12.5MB/s (100 Mbit/s).

  • Network traffic: around 12-15GB/day.

  • An HTTP Web server, see next subsection.

HTTP server requirements

  • If the consensus parameter bwscanner_cc is not set or has a value lower than 2:

    A Web server installed and running that supports HTTP GET, HEAD and Range (RFC 7233) requests. Apache HTTP Server and Nginx support them.

    It also needs to allow `keep-alive, in order to reuse connections between the sbws HEAD request and the several GET ones.

    Note

    if the server is configured with keep-alive timeout, it’d need to be at least the same timeout as in the sbws HTTP requests, which is 10 seconds by default (http_timeout variable in the configuration file, see more about in the next section).

    It also needs a large file; at the time of writing, at least 1 GiB in size It can be created running:

    head -c $((1024*1024*1024)) /dev/urandom > 1GiB
    
  • If the consensus parameter bwscanner_cc has value 2:

    A Web server installed and running that supports HTTP POST either:

    • via Content-Type multipart/form-data (RFC 2388) as a file upload.

    • via Content-Type multipart/form-data RFC 2388 as a raw (text) field upload.

    If your Web server supports HTTP MQTT binary but not the 2 previous methods, open an issue so that we implement the MQTT client part in the scanner.

Example configurations:

  • Apache supporting HTTP GET and the three POST methods:

    <Location "/">
        AllowOverride None
        Order Deny,Allow
        Deny from All
    </Location>
    <Location "/1G">
            Allow from All
    </Location>
    <Location "/postpath">
            Allow from All
    </Location>
    

    And in the directory of static files served:

    head -c $((1024*1024*1024)) /dev/urandom > 1G
    echo OK > postpath
    
  • nginx supporting the three POST methods:

    location /postpath {
      root /same/path/to/normal/directory;
      client_max_body_size 1G;
      # should not be necessary, but just in case nginx tries to litter:
      client_body_in_file_only clean;
      # this is a really horrible hack:
      error_page 405 =200 $uri;
    }
    

    And in the directory of static files served:

    echo OK > postpath
    

You can test your configuration running:

  • HEAD request:

    curl https://bwauth.httpd.ip/1G -i -H "Range: bytes=0-1023"
    

    It should reply:

    HTTP/1.1 206 Partial Content
    Accept-Ranges: bytes
    Content-Length: 1024
    Content-Range: bytes 0-1023/1073741824
    
  • GET request:

    curl -v https://bwauth.httpd.ip/1G
    

    It should reply:

    < HTTP/1.1 200 OK
    < Accept-Ranges: bytes
    < Content-Length: 1073741824
    
  • POST request:

    dd if=/dev/zero of=post-20MB.zero bs=1k count=20480
    curl -F "sbwstest=@post-20MB.zero" https://bwauth.httpd.ip/postpath -O
    curl -F "sbwstest=<post-20MB.zero" https://bwauth.httpd.ip/postpath -O
    

    In the Xferd column it should show 20.0M:

    % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                              Dload  Upload   Total   Spent    Left  Speed
    100 20.0M  100   265  100 20.0M      4   346k  0:01:06  0:00:59  0:00:07    64
    

If you want, use a Content delivery network (CDN) in order to make the destination IP closer to the scanner exit.

Configuring an HTTP server destination in a testing network

For development and integration tests, we use chutney to bootstrap a Tor network and a minimal HTTP server in localhost. sbws only accepts the HTTP scheme (without TLS) for the destination, when its address is 127.0.0.1. In this case, sbws also detects that the Tor network is a TestingTorNetwork and stops after the first loop.

If you need an HTTP server running in other address other than localhost, you would need it to support TLS.

For this, you can create a self-signed certificate and configure sbws to use it by adding the certificate to its verify configuration option

scanner setup

Note

To facilitate debugging, it is recommended that the system timezone is set to UTC.

To set the timezone to UTC in Debian:

apt-get --reinstall install tzdata
ln -sf /usr/share/zoneinfo/UTC /etc/localtime
update-initramfs -u

Install sbws according to INSTALL.rst (in the local directory or Tor Project Gitlab) or INSTALL.html (local build or Read the Docs).

To run the scanner it is mandatory to create a configuration file with at least one destination. It is recommended to set several destinations so that the scanner can continue if one fails.

If sbws is installed from the Debian package, then create the configuration file in /etc/sbws/sbws.ini. You can see an example with all the possible options here, note that you don’t need to include all of that and that everything that starts with # and ; is a comment:

Listing 1 Example sbws.example.ini
# Minimum configuration that needs to be customized
[scanner]
# ISO 3166-1 alpha-2 country code where the scanner is located.
# Default AA, to detect it was not edited.
country = AA
# A human-readable string with chars in a-zA-Z0-9 to identify the dirauth
# nickname that will publish the BandwidthFiles generated from this scanner.
# Default to a non existing dirauth_nickname to detect it was not edited.
dirauth_nickname = dirauth_nickname

[destinations]
# With several destinations, the scanner can continue even if some of them
# fail, which can be caused by a network problem on their side.
# If all of them fail, the scanner will stop, which
# will happen if there is network problem on the scanner side.

# A destination can be disabled changing `on` by `off`
foo = on

[destinations.foo]
# the domain and path to the 1GB file or POST URL.
url = https://example.com/does/not/exist.bin
# Whether to verify or not the TLS certificate. Default True
verify = False
# ISO 3166-1 alpha-2 country code where the Web server destination is located.
# Default AA, to detect it was not edited.
# Use ZZ if the location is unknown (for instance, a CDN).
country = ZZ

## The following logging options are set by default.
## There is no need to change them unless other options are preferred.
; [logging]
; # Whether or not to log to a rotating file the directory paths.log_dname
; to_file = yes
; # Whether or not to log to stdout
; to_stdout = yes
; # Whether or not to log to syslog
; # NOTE that when sbws is launched by systemd, stdout goes to journal and
; # syslog.
; to_syslog = no

; # Level to log at. Debug, info, warning, error, critical.
; # `level` must be set to the lower of all the handler levels.
; level = debug
; to_file_level = debug
; to_stdout_level = info
; to_syslog_level = info
; # Format string to use when logging
; format = %(module)s[%(process)s]: <%(levelname)s> %(message)s
; # verbose formatter useful for debugging
; to_file_format = %(asctime)s %(levelname)s %(threadName)s %(filename)s:%(lineno)s - %(funcName)s - %(message)s
; # Not adding %(asctime)s to to stdout since it'll go to syslog when using
; # systemd, and it'll have already the date.
; to_stdout_format = ${format}
; to_syslog_format = ${format}

# To disable certificate validation, uncomment the following
# verify = False

If sbws is installed from the sources as a non-root user then create the configuration file in ~/.sbws.ini.

More details about the configuration file can be found in ./docs/source/man_sbws.ini.rst (in the local directory or Tor Project Gitlab) or man_sbws.ini.html (local build or Read the Docs) or man sbws.ini (system package).

generator setup

The Debian package from version 1.6.0 replaces cron jobs by systemd.timer to run the generator and the cleanup command to clean the old data.

After the package is installed, it’s needed to enable and start the timers (Debian policy is not to start/enable services by default):

systemctl enable --now sbws_cleanup.timer
systemctl enable --now sbws_generate.timer

To ensure they are enabled run:

systemctl list-timers

It should show the next time the generator or cleanup timer is going to run:

Wed 2023-10-18 08:35:00 GMT 19min left    Wed 2023-10-18 07:35:02 GMT 40min ago         sbws_generate.timer          sbws_generate.service

You can check that the timer service is working by invoking it directly:

systemctl start sbws_generate.service

If sbws is installed in some other way, you would need to create the timers or cron jobs. Example cron jobs:

35 *     * * *   sbws  /usr/local/bin/sbws -c /etc/sbws/sbws.ini generate
05 0     * * *   sbws  /usr/local/bin/sbws -c /etc/sbws/sbws.ini cleanup

You can modify the timers or cron jobs to get emails on failures. For the cron jobs, use MAILTO, for the timers, use OnFailure to call an email service.

If the cron job is configured to send Email alerts on errors, it’s probably better to configure the log level to ERROR instead of WARNING.

At level WARNING, the first days, the generator will log every hour that it hasn’t reached enough percentage of relays to report. After some days, if the scanner is located near fasts exits, it would also log every hour that it is reporting more than the 50% of the consensus bandwidth.

The log level can be changed in the configuration file, for example:

to_stdout_level = error

This setup will affect both to the generator and the scanner, so for Email alerts, it’s probably more convenient to configure it from the command line, for example:

/usr/local/bin/sbws --log-level error generate

See also ./docs/source/man_sbws.rst (in the local directory or Tor Project Gitlab) or man_sbws.html (local build or Read the Docs) or man sbws (system package).

Reading BandwidthFiles from the directory authority

The directory authority tor’s configuration (torrc) must include V3BandwidthsFile option with the whole path to the latest.v3bw files that the scanner generates.

Note

the user running the directory authority tor’s daemon must have permissions to read this path. If the daemon is launched by a systemd service, you would need to add a ReadOnlyDirectories entry with the directory where the latest.v3bw is generated.

Note

During the ~5 first days the scanner has been running, the generator will mark all the RelayLines with vote=0 until the scanner has measured more than the ~60% of the network. The directory authority tor’s daemon ignore these lines and warn about Empty bandwidth file

Troubleshooting

See ./docs/source/troubleshooting.rst (in the local directory or Tor Project Gitlab) or Troubleshooting.html (local build or Read the Docs)