Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-08 Thread Daniel Kahn Gillmor
On Fri 2019-02-08 20:44:33 +, Andrew Gallagher wrote:
> Parse the syslogs of an old style SKS server, fetch any updated
> packets, filter them and submit to the new server.

ah yes, the SMOP (it's a "Simple Matter of Programming") argument :)

> Sync from the old network to the new one only needs to work in one
> direction.

thanks, this is a good insight.

   --dkg


signature.asc
Description: PGP signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-08 Thread Andrew Gallagher


> On 8 Feb 2019, at 19:02, Daniel Kahn Gillmor  wrote:
> 
> Figuring out how to do the partial-sync for a limited time sounds
> difficult to me, and i wonder whether it might be better/faster/cheaper
> to just deploy such an update-only network, and don't bother with the
> partial sync.

Parse the syslogs of an old style SKS server, fetch any updated packets, filter 
them and submit to the new server. Sync from the old network to the new one 
only needs to work in one direction. 

A

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-08 Thread Daniel Kahn Gillmor
On Thu 2019-02-07 23:15:18 +0100, Kristian Fiskerstrand wrote:
> The current discussions we're having (e.g during OpenPGP email summit in
> brussels in october and lately on FOSDEM last weekend) is eventually not
> storing UIDs at all on the keyservers, but require the user to do key
> discovery through WKD, directly on a website or the like. This still
> allows using keyservers to distribute revocation certificates and
> updates to subkeys etc, but not as a discovery mechanism.

thanks for this summary, kristian.  it roughly matches my recollection
of these discussions as well.

It's conceivable that such a constrained updates-only-keyserver network
could also host self-signed user IDs, with reasonable constraints
(e.g. valid UTF-8 only, no more than 512 octets), but no third-party
certifications.  This would permit keyserver-based updates of
expirations, since primary key expiration timestamps are currently
stored in the self-signatures over the User IDs.

Alternately, we could encourage OpenPGP implementations to issue primary
key expiration timestamps as direct-key signatures, not involving a user
ID at all.

Critically, though, this updates-only keyserver network would *only*
permit retreival of keys by fingerprint, and would not provide a
web-based tool for browsing based on User ID, to avoid the usability
failures that we've seen attributed to SKS in the past.

Each node in this proposed updates-only network would also need to be
able to cryptographically verify the OpenPGP packets that it
synchronizes, and should reject packet that cannot be cryptographically
verified.

> Pool-wise it'd be setting up a separate keyserver network that  will
> gossip with the existing network for a time, with separate pool for the
> with-uid and without-uid servers, before the full switch is done...

Figuring out how to do the partial-sync for a limited time sounds
difficult to me, and i wonder whether it might be better/faster/cheaper
to just deploy such an update-only network, and don't bother with the
partial sync.

> The new network would be running on software replacing SKS, using more
> suited database backend that and multi-threaded implementation. The
> current disagreement are really with regards to whether this should be
> "validating keyservers" or not, and how such servers could interact with
> non-validating ones.

"validating keyservers" form an entirely distinct interaction model,
since they are focused on User IDs.  They should not be conflated with
this updates-only proposal.  There's no need to coordinate their
development.

--dkg

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread Kristian Fiskerstrand
On 2/6/19 8:28 PM, Robert J. Hansen wrote:
> What we don't have is *consensus* -- not only among ourselves, but in
> the larger community.

The current discussions we're having (e.g during OpenPGP email summit in
brussels in october and lately on FOSDEM last weekend) is eventually not
storing UIDs at all on the keyservers, but require the user to do key
discovery through WKD, directly on a website or the like. This still
allows using keyservers to distribute revocation certificates and
updates to subkeys etc, but not as a discovery mechanism.

Pool-wise it'd be setting up a separate keyserver network that  will
gossip with the existing network for a time, with separate pool for the
with-uid and without-uid servers, before the full switch is done...

The new network would be running on software replacing SKS, using more
suited database backend that and multi-threaded implementation. The
current disagreement are really with regards to whether this should be
"validating keyservers" or not, and how such servers could interact with
non-validating ones.

-- 

Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk

Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3

"A committee is a group that keeps minutes and loses hours."
(Milton Berle)

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread Andrew Gallagher
On 2019/02/06 23:51, Robert J. Hansen wrote:
> No.  Keyserver reconciliation is 90% of the problem.  Fixing this would
> make it impossible for older keyservers to reconcile with a next-gen design.

I have had a long think about this problem, and I reckon that the
biggest bar to progress is the assumption that arbitrary members of the
pool will upgrade to the new software at random, and that we need to
ensure that all nodes stay synchronised with each other no matter what
version they run, in a single mixed-version network.

We can simplify this problem considerably.

Instead of an operator upgrading their sks server to "new-sks" and
expecting to still be able to peer with traditional sks servers, they
should install the "new-sks" software *in parallel* with the traditional
one (on the same or a different machine, doesn't matter) and this
"new-sks" node should only be able to peer with other "new-sks" nodes.
This means that our new recon protocol can be efficient, because it
doesn't have to keep a record of blacklisted hashes.

If we further assume that key material does not flow back from the
"new-sks" network to the old one, then we can write a relatively simple
cron job that finds updated keys on an old-style sks server (by parsing
its logs, for example) and copies them (suitably censored) to the
corresponding "new-sks" server. At some point, when the "new-sks"
network is sufficiently stable, the pools are redefined and the old sks
network becomes irrelevant.

The above allows us to ignore broad categories of problematic material
by policy, simply by defining a narrow set of allowed packets in the new
protocol. Any compliant "new-sks" server will simply not be capable of
processing packets of unapproved types, e.g. image IDs, 3rd party
signatures, and keys with invalid self-sigs. Also, any peer that tries
to serve too many unapproved packets via recon can be twitted.

What the above will not do is allow individual operators to blacklist
arbitrary packets by hash, not without either some central authority
defining a shared blacklist, or a fake-recon process that maintains
local blacklist caches and runs the risk of split-brain. So the threat
of shutdown by court order is not completely removed.

I still think this may be enough to be getting started with.

A



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread Andrew Gallagher
On 2019/02/07 11:01, Martin Dobrev wrote:
> My idea for blacklists is in a sense similar - during recon process
> consolidate hashes from the blacklists with whatever is in the live
> database and report this to peers. This way it won't trigger continuous
> *recon/fetch/drop due to blacklist* loops.

I wrote a doorstop post on blacklist mechanisms some time back on this
list. The implementation planning is a rabbit-hole, and that's before
you even start thinking about higher-level problems like split-brain.
Eventual consistency is a harsh mistress. :-)

A



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread Andrew Gallagher
On 2019/02/07 05:35, Gabor Kiss wrote:
> And all these programs can talk each to other due to RFC 821 (1982).

Well, yes. A good protocol is everything. The implementation is
relatively easy. Ensuring that the protocol doesn't result in a cascade
failure is the Really Hard Problem. We're still trying to mitigate the
unintended side-effects of RFC821, 37 years after the fact... :-)

A



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread Martin Dobrev

On 07/02/2019 08:02, robots.txt fan wrote:
> On Thursday, February 7, 2019 12:37 AM, Andrew Gallagher 
>  wrote:
>> Because you can reject a key, but then what happens is it just keeps trying 
>> to come back. Pretty soon there are so many rejected keys floating around 
>> that the network stops reconciling. Also, what happens if I reject certain 
>> keys and you don’t, but your only connection to the rest of the network is 
>> through me? Once nodes start implementing different policies you can go 
>> split-brain surprisingly easily.
> I shouldn't have written "reject". If you already have this key in your 
> blacklist, just tell the other keyserver that you already have it, but do not 
> store it. Store only the hash.
>
> Of course it might still be possible to code information into the hashes like 
> Tobias wrote, but at least generating exactly the right hash is extremely 
> expensive (if not impossible) from the attacker's perspective so I do not 
> think it is feasible for them at all. Storing hashes of kryptonite should be 
> okay.

My idea for blacklists is in a sense similar - during recon process
consolidate hashes from the blacklists with whatever is in the live
database and report this to peers. This way it won't trigger continuous
*recon/fetch/drop due to blacklist* loops. There is only the risk that
downstream servers that don't use blacklists will keep asking not just
for the hash but the key too. This is something that can be mitigated in
the next-gen gossip protocol: server A asks for a key belonging to a
hash, it gets a response that server B is not actually having it due to
blacklist flag. Server A can ask another member from the membership pool
to provide the key. If all peers flag it as blacklisted set a flag and
give up retries until membership file changes.

Is this going to work? Most probably yes. Is it going to cause some
issues (see above) due to backwards compatibility in the short term -
yes, but then operators will be keen to upgrade to next-gen server
implementation and the problem gets solved in the long run.

>> It’s not a simple matter of just coding it up.
> Of course not, and I wouldn't dare claiming that. I agree with Martin in that 
> I also am glad to see that there is a will to invest time in developing a new 
> server. The Synchronising Key Servers should not vanish from earth.
>
> ___
> Sks-devel mailing list
> Sks-devel@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/sks-devel

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread Tom at FlowCrypt
Robert,

No doubt it's risky to implement things that there is no consensus on. But
the device I'm writing this on was invented by *not a consensus*, and a
consensus to design it would not have emerged on this list nor elsewhere.

The risk may be lowered:

1) on behalf of our company I'm excited to run whatever not-sks testnode
you prototype

2) fwiw there's Hockeypuck written in a popular language and popular db.
The sks recon is separated into a module, and could be swapped out. All the
other bells and whistles of a ks are there.

3) find one more person and we can call it a test network

As an alternative to Hockeypuck, we also use a keyserver on the backend
written in Node/TypeScript and postgres that I'd be happy to strip/clean up
and contribute. It has no sync nor consensus built in. Based on OpenPGP.js.
I wrote it purely out of my frustration with sks.

I think this list needs resolute action, not consensus. Resolute action is
risky, sure.

My company will issue a modest grant to get a ball rolling on whatever is
not-sks, implemented by a person with a brain (you're overqualified!).

Cheers,
Tom


On Thu, 7 Feb 2019, 08:46 Robert J. Hansen  > It is no use to wait a great consensus.
>
> Without exception, I have never met someone who was reluctant to
> volunteer someone else's time.  I think this is unfortunate.  I'd rather
> we were as reluctant to urge other people to commit their time and
> effort to a project as we are to commit our own.
>
> ___
> Sks-devel mailing list
> Sks-devel@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/sks-devel
>
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-07 Thread robots.txt fan
On Thursday, February 7, 2019 12:37 AM, Andrew Gallagher  
wrote:
> Because you can reject a key, but then what happens is it just keeps trying 
> to come back. Pretty soon there are so many rejected keys floating around 
> that the network stops reconciling. Also, what happens if I reject certain 
> keys and you don’t, but your only connection to the rest of the network is 
> through me? Once nodes start implementing different policies you can go 
> split-brain surprisingly easily.

I shouldn't have written "reject". If you already have this key in your 
blacklist, just tell the other keyserver that you already have it, but do not 
store it. Store only the hash.

Of course it might still be possible to code information into the hashes like 
Tobias wrote, but at least generating exactly the right hash is extremely 
expensive (if not impossible) from the attacker's perspective so I do not think 
it is feasible for them at all. Storing hashes of kryptonite should be okay.

> It’s not a simple matter of just coding it up.

Of course not, and I wouldn't dare claiming that. I agree with Martin in that I 
also am glad to see that there is a will to invest time in developing a new 
server. The Synchronising Key Servers should not vanish from earth.

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Robert J. Hansen
> It is no use to wait a great consensus.

Without exception, I have never met someone who was reluctant to
volunteer someone else's time.  I think this is unfortunate.  I'd rather
we were as reluctant to urge other people to commit their time and
effort to a project as we are to commit our own.



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Gabor Kiss
> There are a handful of people with the background and skills to write a
> next-generation keyserver.  I looked into it a dozen years ago and wrote
> up a whitepaper on it.  I know Phil Pennock has put a lot of thought
> into it.  Andrew, likewise.  There are easily five or six people on this
> list who have the time and ability.
> 
> What we don't have is *consensus* -- not only among ourselves, but in
> the larger community.
> 
> Let's say I decide to implement my whitepaper from 2007.  It would take,
> oh, call it 200 hours of work to implement.  So I write it, put it out
> there, and nothing happens because there's no consensus my idea is the
> direction we should go.
> 
> The problem here is not a lack of manpower or skill.
> 
> It's a lack of community consensus on what a redesign should look like.

My 2 cents:
It is no use to wait a great consensus.

The working model of open source development is:

10 publishing a formal protocol description[1]
20 some peoples implement it
30 collecting experiments
40 years later other peoples write a different implemantation that
  is compatible with the original 
50 GOTO 30

[1]: The famous paper describes the _algorithm_. A protocol description
writes bit-by-bit what is transferred on the wire, what to in case
of any errors, what must to do and what is optional etc. See RFCs.

If there would be _competing_ implementations operators could choose
which one they run. This is an evolution.
Remember Sendmail. 30-40 years ago it was virtually the only (non proprietary)
mail transfer agent (MTA). Eric Allman did a great job. But later other guys
had different ideas. Now there is a dozen MTAs on the market and almost
nobody uses Sendmail. But some do.
And all these programs can talk each to other due to RFC 821 (1982).

Gabor

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Robert J. Hansen
> Is it possible to develop a keyserver thar uses the same interface as
> the current one?

Sort of.

> Meaning that GnuPG-Clients don't need to change

Yes.

> and current keyservers can recon with the new keyservers (since they
> are not all upgraded simultaniously)?

No.  Keyserver reconciliation is 90% of the problem.  Fixing this would
make it impossible for older keyservers to reconcile with a next-gen design.

> Are there any more problems that need to be fixed? Like seriously,
> everyone please write the problems they have with SKS.

Please, *don't*.  We have had this discussion so many times over the
past ~15 years that I can't stand to go through it again.  Go through
the list archives, read those past discussions, and then if you come up
with anything new post it to the list.

> To answer my first question, I guess that it is possible to implement
> a keyserver with the same interface for GPG users that can still
> recon with older servers.

Let's not make this situation worse by guessing.



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Martin Dobrev
Hi

On 06/02/2019 19:28, Robert J. Hansen wrote:
>> If only it were open-source software and individuals with the extra time
>> and talent to work on those design flaws were able to do so. Wouldn't
>> that be a great world to live in?
> Wouldn't it be great if people were to think before snarking?
>
> There are a handful of people with the background and skills to write a
> next-generation keyserver.  I looked into it a dozen years ago and wrote
> up a whitepaper on it.  I know Phil Pennock has put a lot of thought
> into it.  Andrew, likewise.  There are easily five or six people on this
> list who have the time and ability.
I'm glad to see from server operator perspective that there is a will to
invest time in developing the server.
>
> What we don't have is *consensus* -- not only among ourselves, but in
> the larger community.
>
> Let's say I decide to implement my whitepaper from 2007.  It would take,
> oh, call it 200 hours of work to implement.  So I write it, put it out
> there, and nothing happens because there's no consensus my idea is the
> direction we should go.
>
> The problem here is not a lack of manpower or skill.
>
> It's a lack of community consensus on what a redesign should look like.
>
Is there a place where white-papers and draft proposals can be found? I
remember seeing proposals to change the backend database with something
that supports transactions, the likes of postgresql or mysql. Without it
multi-threaded server is not possible. If I had the knowledge of OCAML
I'd start like immediately a fork and implement it in order to save disk
space and more important cut on redundant Iops. Nearly 21K keys have
been added for the past month. Looking at the graph again I don't see a
single plunge just steady growth. As it stands I'm running two physical
servers with four Docker containers each that take approximately 95GB.
Even with a single-thread server implementation I can still run multiple
containers with a shared database, isn't it?

I agree redesign is inevitable if we want to address legislation changes
like GDPR for example. A lot of servers in Europe ceased operation
because of it. Today I read the news that criminals are using
block-chain network to upload child abuse photos. According to UK law
hosting such content can lead to large convictions. I don't want to be
forced to stop my clusters if criminals exploit the photo field in the
protocol. In my opinion there must be a way to remove content that's not
legal from the network.

The way I see this happening is by introducing blacklists that a)
prevent a key from being fetched during recon and b) delete the local
copy of it. Is this a censorship?! For what I know some of us are
already using blacklists to mitigate the poison key issues, the very
least I am.

Building upon the previous suggestion I'm actually envisioning different
types of blacklists in terms of legislation framework they comply with.
Subdomains like .pool.sks-keyservers.net can be introduced as
well. Then individual keyserver operators can configure what blacklists
to use. A public register will keep the audit trail justifying every
blacklist entry and used as a seed for the servers in the network. And
before you ask who's going to be responsible for keeping that register
up-to-date and accurate I have an answer for you - the very same law
enforcement agencies that in the very first place demanded that we
remove content from the network.

That being said I believe these changes will make the network a safer
place not just for the operators but the users as well. That's
something, I think, we as community can easily achieve consensus upon.

Sadly I don't have a  solution for the recent poison key issues that
opened this thread in first place. We eventually need a brand new RFC
that will define the next-gen server architecture.


>
> ___
> Sks-devel mailing list
> Sks-devel@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/sks-devel


signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Andrew Gallagher

> On 6 Feb 2019, at 23:15, robots.txt fan  wrote:
> 
> To answer my first question, I guess that it is possible to implement a 
> keyserver with the same interface for GPG users that can still recon with 
> older servers. The older servers might try to send them keys that are on the 
> blacklist or are large, but the new server can reject those keys of course.

Easier said than done. There is plenty of discussion in the archives about how 
difficult this would be technically. Because you can reject a key, but then 
what happens is it just keeps trying to come back. Pretty soon there are so 
many rejected keys floating around that the network stops reconciling. Also, 
what happens if I reject certain keys and you don’t, but your only connection 
to the rest of the network is through me? Once nodes start implementing 
different policies you can go split-brain surprisingly easily. 

It’s not a simple matter of just coding it up.

A

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread robots.txt fan
On Wednesday, February 6, 2019 8:28 PM, Robert J. Hansen  
wrote:
> It's a lack of community consensus on what a redesign should look like.

That can be changed. I do not know anything about the source code of this 
project, so forgive my naivety.

Is it possible to develop a keyserver thar uses the same interface as the 
current one? Meaning that GnuPG-Clients don't need to change and current 
keyservers can recon with the new keyservers (since they are not all upgraded 
simultaniously)?

Of course, that while also being able to not accept large keys. A first step 
might be limiting UIDs to a certain size, but then one could just generate lots 
of UIDs, or if you also limit the number of UIDs per key, they could generate 
lots of keys.

Furthermore, what would be nice if content could be deleted. I'm thinking about 
GDPR requests from people who do not want their data online anymore, or illegal 
content coded into UIDs or User Attribute Packets. Perhaps this can be 
implemented through a blacklist of fingerprints that synchronises.

Are there any more problems that need to be fixed? Like seriously, everyone 
please write the problems they have with SKS.

To answer my first question, I guess that it is possible to implement a 
keyserver with the same interface for GPG users that can still recon with older 
servers. The older servers might try to send them keys that are on the 
blacklist or are large, but the new server can reject those keys of course.

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Matthew Walster
On Wed, 6 Feb 2019, 20:28 Robert J. Hansen 
> It's a lack of community consensus on what a redesign should look like.
>

And, might I add, the desire for our efforts not to be ruined by others
"proving a point" rather than actors actually seeking malicious intent.

I've abandoned my keyserver, and only advertise my keys as a pointer in DNS
to download it via http.

M

>
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Robert J. Hansen
> If only it were open-source software and individuals with the extra time
> and talent to work on those design flaws were able to do so. Wouldn't
> that be a great world to live in?

Wouldn't it be great if people were to think before snarking?

There are a handful of people with the background and skills to write a
next-generation keyserver.  I looked into it a dozen years ago and wrote
up a whitepaper on it.  I know Phil Pennock has put a lot of thought
into it.  Andrew, likewise.  There are easily five or six people on this
list who have the time and ability.

What we don't have is *consensus* -- not only among ourselves, but in
the larger community.

Let's say I decide to implement my whitepaper from 2007.  It would take,
oh, call it 200 hours of work to implement.  So I write it, put it out
there, and nothing happens because there's no consensus my idea is the
direction we should go.

The problem here is not a lack of manpower or skill.

It's a lack of community consensus on what a redesign should look like.




signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Jeremy T. Bouse
On 2/6/2019 11:26 AM, Andrew Gallagher wrote:

> On 06/02/2019 13:11, Steffen Kaiser wrote:
>> Is it meant litterally? The current SKS project is end of life and,
>> effectively, we have to look into another direction? Other software, new
>> fork with rewrite?
> I said "effectively", not literally. And I was in a grumpy mood that
> day. But I stand by my point about design flaws not getting the
> attention they deserve. You don't need to fork the codebase to make
> improvements, but you do need to redesign the protocol to be
> abuse-resistant, which is a Very Hard Problem. If we had some consensus
> on the way forward it would be a good start.

If only it were open-source software and individuals with the extra time
and talent to work on those design flaws were able to do so. Wouldn't
that be a great world to live in?


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Andrew Gallagher
On 06/02/2019 13:11, Steffen Kaiser wrote:
> Is it meant litterally? The current SKS project is end of life and,
> effectively, we have to look into another direction? Other software, new
> fork with rewrite?

I said "effectively", not literally. And I was in a grumpy mood that
day. But I stand by my point about design flaws not getting the
attention they deserve. You don't need to fork the codebase to make
improvements, but you do need to redesign the protocol to be
abuse-resistant, which is a Very Hard Problem. If we had some consensus
on the way forward it would be a good start.

-- 
Andrew Gallagher



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Tobias Frei
Hi,

Isn't Mozilla Thunderbird in a similar state? I'm still happily using it
*because* it has reached a point where further updates are rarely needed.

Best regards
Tobias Frei

On Wed, Feb 6, 2019, 14:22 Steffen Kaiser  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> I picked up this sentence here on the list in a thread about poison
> key(s):
>
> "> Any chance that sks will be fixed some day?
>
> "Short answer, no. SKS is effectively running as end-of-life software at
> this point. It gets emergency bugfixes but little else. The improvements
> you are talking about would require an enormous refactoring of the
> codebase, likely requiring migration to a different database engine.
> Given that there are fundamental design flaws (poison keys) that aren't
> getting fixed, performance issues just aren't on the radar. Sorry."
>
> Is it meant litterally? The current SKS project is end of life and,
> effectively, we have to look into another direction? Other software, new
> fork with rewrite?
>
> Kind regards,
>
> - --
> Steffen Kaiser
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1
>
> iQEVAwUBXFrc6iOjcd6avHZPAQI8iAgAhMVSiTvPdMARX20Kqkt7BQAIFwcnqi/K
> GncegVdHZqf6PkyogVwXxMDxExOm+dJmkyJDD8IOsc6SQW+Tx7YDOcTynLsvFPQ9
> NjehfxC6+O0Himxr1AAm75HZ3oU82e9GMteebbbyLc2pr0ggx7BNtIf81YjCwzxy
> clLLCLZOCb8HAuXBYGi0X7z0iD9511nWQ6vbbpNEuTdz4rv/Fsvgre6SMQ8blYS6
> mYlCsSv8AoL3vFux3E+8gsDUn/uOFzdvL+W6Ei5ETMd4zt4OVfyuGX/P1SBEGl+5
> 7Wfo3ev7F7ZaY7cJy1aOfF9lTKNF8Fuweq+wvBCnhL1B3dLuZ8Gqjw==
> =Id3h
> -END PGP SIGNATURE-
>
> ___
> Sks-devel mailing list
> Sks-devel@nongnu.org
> https://lists.nongnu.org/mailman/listinfo/sks-devel
>
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


[Sks-devel] "SKS is effectively running as end-of-life software at this point"?

2019-02-06 Thread Steffen Kaiser

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I picked up this sentence here on the list in a thread about poison 
key(s):


"> Any chance that sks will be fixed some day?

"Short answer, no. SKS is effectively running as end-of-life software at
this point. It gets emergency bugfixes but little else. The improvements
you are talking about would require an enormous refactoring of the
codebase, likely requiring migration to a different database engine.
Given that there are fundamental design flaws (poison keys) that aren't
getting fixed, performance issues just aren't on the radar. Sorry."

Is it meant litterally? The current SKS project is end of life and, 
effectively, we have to look into another direction? Other software, new 
fork with rewrite?


Kind regards,

- -- 
Steffen Kaiser

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEVAwUBXFrc6iOjcd6avHZPAQI8iAgAhMVSiTvPdMARX20Kqkt7BQAIFwcnqi/K
GncegVdHZqf6PkyogVwXxMDxExOm+dJmkyJDD8IOsc6SQW+Tx7YDOcTynLsvFPQ9
NjehfxC6+O0Himxr1AAm75HZ3oU82e9GMteebbbyLc2pr0ggx7BNtIf81YjCwzxy
clLLCLZOCb8HAuXBYGi0X7z0iD9511nWQ6vbbpNEuTdz4rv/Fsvgre6SMQ8blYS6
mYlCsSv8AoL3vFux3E+8gsDUn/uOFzdvL+W6Ei5ETMd4zt4OVfyuGX/P1SBEGl+5
7Wfo3ev7F7ZaY7cJy1aOfF9lTKNF8Fuweq+wvBCnhL1B3dLuZ8Gqjw==
=Id3h
-END PGP SIGNATURE-

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel