> > *PLONK*
>
> Could someone please do me a kindness [...]
Phil,
Have you ever seen this lovely sign? :-)
http://upload.wikimedia.org/wikipedia/commons/1/19/Trolls.jpg
Gabor
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/ma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2014-04-19 at 02:21 +0200, Simon Lange wrote:
> Am 18.04.2014 23:16, schrieb Phil Pennock:
> > -Phil
>
> *PLONK*
Could someone please do me a kindness and pass on a message to Mr Lange?
Maintaining a keyserver peering requires the ability to co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 18.04.2014 23:24, schrieb Daniel Kahn Gillmor:
> On 04/18/2014 04:42 PM, Simon Lange wrote:
>> "bad ppl" could pretend offering a public service using my machines they
>> dont own nor they administre nor they run. my machines would support
>> that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 18.04.2014 23:39, schrieb Martin Papik:
>
> By the way, Phil's email explains why it's required, and now I
> understand why it's a true requirement, at least for servers in the
> pool. For non pool servers it doesn't matter.
since i only talked a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 18.04.2014 23:16, schrieb Phil Pennock:
> On 2014-04-18 at 20:24 +0200, Simon Lange wrote:
> >the reason why a reverse proxy is "required" is, because some
> > require additional "security" at the nodes.
>
> False.
ehm. nope. thats is what
On 04/18/2014 04:42 PM, Simon Lange wrote:
> "bad ppl" could pretend offering a public service using my machines they
> dont own nor they administre nor they run. my machines would support
> that passivly. think this is easy to understand. and also has some legal
> implications. just imagine feds w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2014-04-18 at 20:24 +0200, Simon Lange wrote:
>the reason why a reverse proxy is "required" is, because some
> require additional "security" at the nodes.
False.
The SKS software is single threaded and handles a single request at a
time.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
maybe. thats why e prefer a techdoc which eliminates possible
interpretations. ;)
>
> Feds aren't stupid. Your machines wouldn't support anything, and
that STRONGLY depends where you living. i could tell you days filled
with stories about really st
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/18/2014 11:42 PM, Simon Lange wrote:
> https://twitter.com/krifisk/status/456717051340791808 "With a HTTP
> Host header not belonging to the specific hostname? Note the -H
> 'Host.' , 11371 should allow ALL traffic through"
Sounds more lik
im afraid gpg wont show that while using it. ;)
but for the webinterface its valid. ;)
but i see you understand now my problem. ;)
Simon
Am 18.04.2014 22:38, schrieb Tobias Frei:
> Hi,
>
> simply add "this page is served by keys.s-l-c.biz; I am in no way
> affiliated with other hostnames which m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 18.04.2014 22:10, schrieb Martin Papik:
> Answering ALL host names just makes you willing to participate in any
> pool by default, without extra maintenance. But again, AFAIK this
> isn't a requirement. Am I misinformed?
https://twitter.com/krifi
Hi,
sorry for my naivity, but I can't really think of a scenario where it
would be a problem that your PGP keyserver (and only that one,
keys.s-l-c.biz) is accessible under any other domain name.
If your keyserver is accessible at insert-racist-domain-name-here.tld,
so what? Does that make you a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/18/2014 10:37 PM, Simon Lange wrote:
> Ive been told that it is required to allow ALL incoming traffic to
> the IP of my keyserver for port 11371 no matter what hostname is
> requested. that would - of course - allow everyone on this planet
> t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 18.04.2014 21:18, schrieb Martin Papik:
> On 04/18/2014 09:24 PM, Simon Lange wrote:
> > yesterday i learned i have to give up control who is using his
> > domain with my services. :/
>
> Please explain, I'm not aware of such a requirement and if
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/18/2014 09:24 PM, Simon Lange wrote:
> yesterday i learned i have to give up control who is using his
> domain with my services. :/
Please explain, I'm not aware of such a requirement and if there is
such I would like to know about it so I can
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
after directly communicating with Kristian via twitter i could enlight
the whole situation.
first. the whole process lacks of rudementary technical documentation.
second. if the requirement is a reverse proxy and there is one, but your
script fa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I don't know who maintains the monitor, but this email chain prompted
me to have a quick look at the differences between the responses
between a reverse proxy and SKS and I found a few differences and how
to detect a reverse proxy. I've come up with
Hi,
On 04/17/2014 04:20 PM, Simon Lange (BIT) wrote:
> well, but there IS a reverse proxy. ;)
> tcp0 0 78.46.21.218:11371 0.0.0.0:* LISTEN
>
> 8804/lighttpd
If I remember right, the monitor checks for a 'VIA' header. See
https://bitbucket.org/skskeyserver/sks
Er, sorry, I see you already do that. Then maybe the automatic
detection failed for whatever reason.
And I just noticed that your status changed to "OK". Weird^^
Best regards,
Tobias Frei
Am 18.04.2014 13:30, schrieb Tobias Frei:
> Hi,
>
> maybe you need to send a correct "Via:" header to allo
Hi,
maybe you need to send a correct "Via:" header to allow automatic
detection of the reverse proxy. If proxying is done completely
transparent, there is probably no way to see that there is actually a
proxy in front of sks. That's what I would assume, at least.
Best regards,
Tobias Frei
Am 1
20 matches
Mail list logo