11:52 |
awt |
$ticker btc usd |
11:54 |
asciilifeform |
!q seen busybot |
11:54 |
dulapbot |
busybot last seen here on 2021-11-18 09:41:04: PeterL: who is your daddy and what does he do? |
11:55 |
asciilifeform |
hrm nm mine hasn't the foo[bar] remover |
11:55 |
asciilifeform |
!q seen busybot[asciilifeform] |
11:55 |
dulapbot |
busybot[asciilifeform] last seen here on 2022-09-13 11:52:37: Current BTC price in USD: $20835.34 |
| |
~ 2 hours 21 minutes ~ |
14:16 |
* |
asciilifeform apropos of nuffin, as of today 30yrs of sitting in usa, lol |
| |
~ 1 hours 2 minutes ~ |
15:18 |
awt |
happy intake day |
| |
~ 40 minutes ~ |
15:59 |
asciilifeform |
lolty |
16:11 |
PeterL |
what are we taking in? |
| |
~ 25 minutes ~ |
16:37 |
awt |
PeterL: asciilifeform went through USG intake process 30 years ago today, it seems. |
16:37 |
awt |
https://www.quora.com/What-is-intake-like-in-prison |
| |
~ 1 hours 53 minutes ~ |
18:30 |
jonsykkel |
asciilifeform: looks good, as far as i can tell u would expect that if both X+Y are live in the net, they will "always" be able to recv addrcasts from each other, and at aprox the same time. but if T_p is comfigured diferently they will start hammering out of sync (also wat happens after H has expired? give up or retrry la |
| |
↖ |
18:30 |
jonsykkel |
ter) |
18:30 |
jonsykkel |
thing 2: not 100%sure my internal model of nat is corectt but wouldnt the maffs depend hevily on exact nature of nat? at least my understanding of wat the problem looks something like this: |
18:31 |
jonsykkel |
unpredictable (somewat) factors: nat maping table size (no idea, according to some random account, on order of 2^10-2^14 for typical consoomer router, unlikely to be significantly smaller than that 2^10 at least), timeout of the mapings (usually in the range of 30sec to couple minutes max from wat i can figure) |
18:31 |
jonsykkel |
so if we assume "worst case", 30sec timeout, either the table size or the spam interval will be the limiting factor. u prolly dont want to be spamming faster than something like 0.1ms |
18:31 |
jonsykkel |
which means u will have a "moving window" (as rules time out and get replaced with new ones) of at most 30sec/0.1ms = 300k entries (would guess the tables tend to be smaller than this in practice). lets call window size "W" and spam interval "S" |
18:31 |
jonsykkel |
in the case of the maximally annoying nats, each entry in table wil have src+dst ports that both have to match |
18:31 |
jonsykkel |
which means, after this window has been "saturated" (W*S sec has passed), u have W/(64512^2) = between 0.000025% (W=2^10) and 0.0072% (W=300k) chance of succes for every packet that actually arrives |
18:31 |
jonsykkel |
this translates to chance of success (assuming 0%packet loss) within 60sec = 1-((1-W/(64512^2))^(2*(60/S))) = 25.6% (W=2^10) or ~100% (W=300k) |
18:31 |
jonsykkel |
both my nats are definitely of the annoying type, confirmed by experiments (can not send to nat assigned port from the same external host throguh a diffrent udpsocket). the litle data i colected seems to indicate my W might be somewhere in 3k-30k range |
| |
↖ |
| |
~ 18 minutes ~ |
18:49 |
jonsykkel |
also, if retry later after H expired - how to sync? |
18:50 |
jonsykkel |
supose could have flag in the addres casts "i will start hammering T_p sec after sending this packet, if prods fail. plox to do same" |
| |
↖ |
18:51 |
jonsykkel |
then flag would be set for initial addrcast and then every x min or watever |
19:03 |
jonsykkel |
actualy not sure why i thouhgt "always at arpox same time", thers no guarante of this at all. but i gues the H would be much longer than the adr cast interval |
19:03 |
bitbot |
Logged on 2022-09-20 18:30:50 jonsykkel: asciilifeform: looks good, as far as i can tell u would expect that if both X+Y are live in the net, they will "always" be able to recv addrcasts from each other, and at aprox the same time. but if T_p is comfigured diferently they will start hammering out of sync (also wat happens after H has expired? give up or retrry la |
| |
~ 46 minutes ~ |
19:50 |
asciilifeform |
jonsykkel: if operators mostly agree on a default T_c, then hammer will start at roughly same time. |
| |
↖ |
19:51 |
asciilifeform |
( if not, then connection will take multiple hammerings, initiated by >1 addrcast ) |
19:51 |
asciilifeform |
eventually they'll connect. |
19:52 |
asciilifeform |
ditto T_p etc. |
19:53 |
asciilifeform |
afaik there are no NATs where it'll start (i.e. lets out udp at all) where hammer won't eventually penetrate. |
19:55 |
asciilifeform |
old-style (pre-microshit) skype used this algo. |
19:58 |
asciilifeform |
http://logs.bitdash.io/pest/2022-09-20#1013285 << any idea whether the ephemeral port #s predictable in these ? imho worth a look |
| |
↖ |
19:58 |
bitbot |
Logged on 2022-09-20 18:31:42 jonsykkel: both my nats are definitely of the annoying type, confirmed by experiments (can not send to nat assigned port from the same external host throguh a diffrent udpsocket). the litle data i colected seems to indicate my W might be somewhere in 3k-30k range |
19:58 |
bitbot |
Logged on 2022-09-19 18:34:53 asciilifeform[4]: suspects that the hammer time can be shortened considerably by preferentially exploring the space around the ephemeral ports seen in successfully-received prods from currently-warm peers -- many NATs issue ephemeral ports sequentially |
20:00 |
asciilifeform |
http://logs.bitdash.io/pest/2022-09-20#1013287 << not bad idea imho, but possibly not needed if general agreement re intervals |
20:00 |
bitbot |
Logged on 2022-09-20 18:50:57 jonsykkel: supose could have flag in the addres casts "i will start hammering T_p sec after sending this packet, if prods fail. plox to do same" |
| |
~ 47 minutes ~ |
20:48 |
jonsykkel |
http://logs.bitdash.io/pest/2022-09-20#1013291 << but common case will prolly be that one guy restarts station rather than working peering going cold while both stations running |
20:48 |
bitbot |
Logged on 2022-09-20 19:50:37 asciilifeform[5]: jonsykkel: if operators mostly agree on a default T_c, then hammer will start at roughly same time. |
20:50 |
jonsykkel |
so, if X restarts station, X and Y are out of sync re coldness of eachother |
| |
↖ |
20:52 |
jonsykkel |
perhaps can be fixed by simply responding immediately to a received addr cast IF the last one u sent to this peer was long ago |
| |
↖ |
20:55 |
jonsykkel |
ttp://logs.bitdash.io/pest/2022-09-20#1013297 << one nat was 4g carriers, the other one some router |
20:55 |
jonsykkel |
http://logs.bitdash.io/pest/2022-09-20#1013297 << one nat was 4g carriers, the other one some router |
20:55 |
bitbot |
Logged on 2022-09-20 19:58:38 asciilifeform[6]: http://logs.bitdash.io/pest/2022-09-20#1013285 << any idea whether the ephemeral port #s predictable in these ? imho worth a look |
20:55 |
jonsykkel |
4g one appeared entirely random every time from the full range |
20:56 |
jonsykkel |
the router seemed to assign ports clustered around the same place, but i dont know whether that was cuz src port was the same, or cuz mappings created around same time |
20:56 |
jonsykkel |
ill try to figure out the logic, but presumably they all work diffrently |
| |
~ 19 minutes ~ |
21:16 |
jonsykkel |
http://logs.bitdash.io/pest/2022-09-20#1013304 << or rather, their casts will be out of phase. worst case one guy starts hammering T_a before the other |
21:16 |
bitbot |
Logged on 2022-09-20 20:50:32 jonsykkel: so, if X restarts station, X and Y are out of sync re coldness of eachother |
| |
~ 2 hours 10 minutes ~ |
23:27 |
crtdaydreams |
pestron borked, aborting |
23:27 |
jonsykkel |
ugota update to 96K so it knows wat to do with adres cast |
23:28 |
jonsykkel |
or prod rather |
| |
~ 18 minutes ~ |
23:46 |
crtdaydreams |
generally, what do most folks have their address cast interval set to? |
23:47 |
crtdaydreams |
also, unsure if bug or feature, but getting ~minimum~ 5 AC packets from all peers in short interval |
23:48 |
crtdaydreams |
jonsykkel: tried increasing acint but still making 5 AC requests by the looks of it, which chewing up bandwidth, pestron making the requests almost every 10 seconds |
23:50 |
jonsykkel |
crtdaydreams: knob works, u might be seing rebroadcasts of incoming ACs |
23:51 |
jonsykkel |
theres tons of these |
| |
↖ |
23:53 |
crtdaydreams |
jonsykkel: hm it seems a bit excessive |
23:54 |
crtdaydreams |
whats log output on your end look like? is my pestron blasting AC over9000 times a minute, also 10x'ed my prodint. |
23:55 |
jonsykkel |
crtdaydreams: http://zzz.st/up/E7Riuzjx/ |
23:56 |
jonsykkel |
u see outgoing AC hash matches incoming one, aka rebroadcast |
23:57 |
jonsykkel |
exept those last4, which are from my statoin |
23:57 |
* |
crtdaydreams recalls jonsykkels pentagram diagram of net broadcasts |
23:58 |
crtdaydreams |
herm |
23:59 |
crtdaydreams |
exponentially proportional to size of net |
23:59 |
jonsykkel |
u also gota set igint 10000 or smth if wish to minimize bw |
23:59 |
crtdaydreams |
what igint do? |
23:59 |
jonsykkel |
ignore pakets inteval |
23:59 |
crtdaydreams |
ah |