-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Jason Harris: > On Wed, Dec 18, 2013 at 10:20:26PM +0000, adrelanos wrote: > >> I am planing to write a script, which will refresh the apt >> signing key before updating using "apt-get update". The script >> might get accepted in Debian. [1] With my Whonix hat on, it's >> safe to say, that this script will be added to Whonix (which is a >> derivative of Debian). >> >> Writing that script would be much simpler if it could re-use the >> existing keyserver infrastructure. Now imagine if this gets added >> to Debian, that all users of Debian and all its derivatives will >> always refresh their signing key against keyservers? Could >> keyservers cope up with the load? >> >> The legal question would be interesting, but don't worry, if you >> ask me not to use keyservers for this, I'll use a mechanism >> outside of keyservers. > >> [1] >> http://lists.debian.org/debian-security/2013/12/msg00031.html > > 1) setup your own DNS so you can shut things off if anything goes > wrong! (you can use dyn.com or others, no servers required)
Interesting idea. I guess in that case I'll got with what I wrote under 3). > 2) probably best discussed on the sks-devel list, Reply-To set > accordingly Okay, I'll repost there. > 3) try running your own keyserver(s), SKS is easy enough to deploy I don't have a lot servers with bandwidth available. And rather than spending money on that, in case keyservers decline, I am probably re-using sourceforge.net's infrastructure. I already asked them once about a similar thing [they're willing to host our project news files (comparable small files with comparable load)], they'll most likely accept that as well. I don't know how they or some others manage it, but their traffic comes virtually for free. -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJSsmskXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5QjE1NzE1MzkyNUMzMDNBNDIyNTNBRkI5 QzEzMUFEMzcxM0FBRUVGAAoJEJwTGtNxOq7vRloP/i0vZRFCyQY7NBc1ZxPuVJpA PPiKuXODo/+jG/VX8krkYWaAIL9otCwrUMFlS0LxFYHvtfx03NaISaGG1WV3mWJA 1KiqODX+5RszCf/By4tW9JE1EdNeOjZM+XhPZ6oRMQogpmtVAe1EFIscQ84H3k0T SOcd4I//Q+7qkomhEu+C0crSogzzyvYRhG52a7IGDUCLRrhAc+CX0WbYqc5OZj5c qHGdDMPbhpa0/Z514pYuewUu4tQDc3NLZ1fpZGd6GeY3zC/grrLEtnbQogkjeiwB nIu90TC5yYGw8B9reJlfb6lq6s+QG/bs6yweHVg4oaa/i7Lfe9O6/WMshshuu62z sMt3eyAeXTyKFYPv9kugSFNkqGHWlDome3PJzYOqRE3BkxYU21qegzTfNUD50jpH pNVX5I7wSecpvNa3yIEE9000FDOdwvx/sJrEhmlY90J12BHZATJHQgcgq04GAPQT OL+kYRhifdS6BE7VXT2eHepQzviGScPZ09n+5ZpkX6nn/pcW84McUYg3qpam8OoU hGmcoJ0V5dnGNJjmzdMfeej1TsYKjE+uWpAod/lPnXHry/4FYTTSxrdfyfaRQOJx yd2DkcjZ0EzP/13DS8GxgH53FKiqxIQxjDhVyBNeSVnjB/f6TbuMJH3ZEl0FL3gn /ex0cwPRQ6lVxLtcpg8f =/K1w -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users