-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I've checked out the script that Matt uses and once I get my server
stabilized more I'll get it enabled and available. My server is in the
US but it is on a gigabit fiber connection.
On 3/15/2019 6:49 PM, Matt Rude wrote:
> The keyserver
The keyserver https://keyserver.mattrude.com/dump/ is producing dumps
once again. It had some corruption in the database. I pulled a fresh
copy from one of my mirrors and updated the dump.
If anyone has any problems, please let me know.
Thanks
-Matt
On 3/15/2019 2:54 PM, Gabor Kiss wrote:
>>
Hello,
I'm managing a pretty new server, but already running in the public pool
(reconciled pretty well).
I'm in no position to offer regular/periodic dumps as a permanent public
service, since I have neither bandwidth nor plenty of s of space. But, since
the continual operation of the server
On 3/15/19 3:54 PM, Gabor Kiss wrote:
>> I have loaded key dumps from http://stueve.us/keydump.
>> I see 5.450.511 keys loaded.
> (SNIP)
> We lack fresh and fast reachable dumps, folks.
> (Keys.niif.hu - the server operated by me - was the one of
> the last three dump sources but it is also dead
When loading loads between and 0089, the server is installed with
5.385.190 keys. Of course, the shortage of dump publishers is forcing
beginners. I first used the dumps published by the mattrude, but in a
few days the dumps were deleted on the server. there is not enough free
space on my
> I have loaded key dumps from http://stueve.us/keydump.
> I see 5.450.511 keys loaded.
Just a note.
steve.us/keydump looks like ths:
...
sks-dump-0085.pgp 01-Dec-2018 02:22 121M
sks-dump-0086.pgp 01-Dec-2018 02:23 126M
sks-dump-0087.pgp 01-Dec-2018
Hi,
I am looking for peers for a new SKS keyserver installation.
I am running SKS version 1.1.6+, on sks.teknoloji360.com.
The server is physically located in Turkey (TR).
The machine has not IPv6 connectivity. Only IPv4.
I have loaded key dumps from http://stueve.us/keydump.
I see 5.450.511
Hello everyone,
as the "SKS is effectively running as end-of-life software
at this point", thread pointed out, a new implementation of a
keyserver would need to:
- be totally backward compatible, both with the current keyserver
infrastructure, and client (i.e GnuPG)
- be robust to "silly"