-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add proposal for external vpn data format #274
base: master
Are you sure you want to change the base?
Conversation
I've been playing with Outline connectivity tests at The test consists in resolving a domain name with a DNS resolver over a proxy using Shadowsocks as the transport. I get reports like: {
"time":"2023-05-05T23:11:25Z",
"duration_ms":24,
"proxy":"[IP]:443",
"resolver":"8.8.8.8:53",
"proto":"tcp",
"prefix":"HTTP/1.1 ",
"error":{"op":"dial","msg":"connection refused"}
} I believe that encapsulates all the info I need. We don't really need the resolver. It only tells me whether the server supports IPv4 and IPv6 destinations. For the errors, the operation that failed and the error seems to be good. The operation is "dial", "write" or "read". Ideally we would canonicalize the error somehow, but that's protocol and platform-dependent. Prefix is an Outline-specific feature. |
Perhaps a better option is to break down the errors calling out each action explicitly:
Perhaps it makes sense to stick to the POSIX errors when possible:
In that case we could use the names of the errors:
For UDP, the errors we see on TCP connect may show up on receive instead. If an action was not done, the error should be |
@ainghazal & @fortuna Reviving this discussion. @ainghazal Can you please share some thoughts on what metrics or specific errors your openvpn & wireguard experiment would capture? I wrote a document to discuss some high-level requirements of designing an end-to-end network error logging system, which includes some discussions on error format. I believe the decision on the data format should be left to the client but a higher-level meta format can be defined to have fields such as report type and version which are read first during consumption such as the example provided here. |
@ainghazal I just saw the other PR #293. I am going to review the information there to get a better understanding of the openvpn format. |
while it can be interesting to gather some of the semantics for the internal OpenVPN experiment, #293 is perhaps too tied to gather network traces to help diagnose the blocking of OpenVPN. The spec proposal in this issue is conceived to be used by almost any tunneling protocol, and to be injected externally (i.e., perhaps bypassing other abstractions assumed in use by the official OONI probes). |
my concern is that, in order to process data and store it in the database, we'd need to agree on a common structure, or at least to be able to version and track data submitted by a few clients we're interested in understanding.
my original proposal did suggest a "vpn-network-error", mostly to differentiate from http-like reports that we might also receive if clients are able to send also reports about web APIs being blocked. But perhaps we can only focus on the former for now: |
Checklist
Description
This proposal contains a data format that would enable receiving data from external sources with compatible semantics to what we will be obtaining via the vpn experiments.
I'm hesitant whether the right form would not be to declare a new experiment directly - but I suspect the experiment itself should just extend the data format and deal with the mechanics of receiving, validating (and probably, verifying) submission, either direct or via aggregation from trusted sources. separating it so probably enables easier changes on the submission mechanism themselves.
Do note that an analog discussion needs to happen for the openvpn & wireguard experiments. The semantics is probably clearer there since we can probably refactor to a generalized vpn data format (for which openvpn or wireguard are just special cases), making the experiment then more naturally tied to provider-specific logic and implementations.