Delivery-Date: Thu, 10 Dec 2015 15:25:54 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 284A21E0529;
	Thu, 10 Dec 2015 15:25:52 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9C843389C9;
	Thu, 10 Dec 2015 20:25:47 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 92F16389C0
 for <tor-talk@lists.torproject.org>; Thu, 10 Dec 2015 20:25:44 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 4QTk52NcbAvd for <tor-talk@lists.torproject.org>;
 Thu, 10 Dec 2015 20:25:44 +0000 (UTC)
Received: from smtp26.openmailbox.org (smtp26.openmailbox.org [62.4.1.60])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 58521389BB
 for <tor-talk@lists.torproject.org>; Thu, 10 Dec 2015 20:25:44 +0000 (UTC)
Received: by mail2.openmailbox.org (Postfix, from userid 1002)
 id 91CAD7C1CC1; Thu, 10 Dec 2015 21:25:40 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1449779140;
 bh=f86g5lhP4tYE0GP+Q8SsHfSI0Dsla1cGqySq0Ghr8/0=;
 h=Subject:To:References:From:Cc:Date:In-Reply-To:From;
 b=zUwjqywtdQzQs9dYY1oKBYKZB9k/0WNF5k9LbrrU0YQI/qQIy5lXFpMpssASiE8IP
 HlSZUE8hFvzidHT63s/NcMuZYBvhkFiCy6GkWZCAoLa/SCqhd6cG0+/8flgFPhOax0
 rYr1lsn1Wp6KJyOzW2Zib3hn9FitFkwW57v1LZyI=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1449779130;
 bh=f86g5lhP4tYE0GP+Q8SsHfSI0Dsla1cGqySq0Ghr8/0=;
 h=Subject:To:References:From:Cc:Date:In-Reply-To:From;
 b=Bsv/wVDJXVP//M48pKFAk0pOtduCgFWPlok8UjTcbFSQ6Ub06SwXw81X1mgBjCMsT
 ZBLFuNKZULdfoo51qkkvtEit0rWYQMVBVOn8hjS9ehGZDIum/ISnvkC4SHbOE+zLcg
 J4WZ7JF98PMA5UH7ezS+JDfNdOncXknm9W2kfyoU=
To: tor-talk@lists.torproject.org
References: <5669CCA2.6080307@openmailbox.org> <20151210192501.GA31965@raoul>
From: nusenu <nusenu@openmailbox.org>
Message-ID: <5669DFB0.9040204@openmailbox.org>
Date: Thu, 10 Dec 2015 20:25:20 +0000
MIME-Version: 1.0
In-Reply-To: <20151210192501.GA31965@raoul>
Subject: Re: [tor-talk] single entity running >36% exit probability with 5
 relays? scary.
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

> After a bit of investiguation turns out 3 new relays were advertising a
> HUGE bandwidth.

The advertised bw should not really matter when we have bwauths
providing measurements, no?

So lets have a look at what measurements they provided here.

Example: consensus 2015-12-10 14:00:00 [1]

relay PhantomTrain6 had a consensus weigh of: 2150000

(that implies that the median of bwauth measurements is 2150000 or
~2GByte/s)

longclaw measured: 2150000
maatuska measured: 1280000
moria1 measured:   2150000
gabelmoo no measurment
Faravahar no measurement

tor's definition of the median of 1280000 2150000 2150000
is: 2150000 (correct)

so the actual question is:

Why do bwauth come to such measurement results?




(these URL have a limited lifetime)
[1]
https://collector.torproject.org/recent/relay-descriptors/consensuses/2015-12-10-14-00-00-consensus

measurement votes:

https://collector.torproject.org/recent/relay-descriptors/votes/2015-12-10-14-00-00-vote-23D15D965BC35114467363C165C4F724B64B4F66-B1ACC50C2312FDBF79A865CF02C84768B0A0DB42

https://collector.torproject.org/recent/relay-descriptors/votes/2015-12-10-14-00-00-vote-49015F787433103580E3B66A1707A00E60F2D15B-864EC3E54278C0712395FABB8AA0693CF134DFB7

https://collector.torproject.org/recent/relay-descriptors/votes/2015-12-10-14-00-00-vote-D586D18309DED4CD6D57C18FDB97EFA96D330566-E4B0896C35645E9F77FA480D376A09E2F0D0D335
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

