Sorry guys
pgpkeys.urown.net (and pgpkeysximvxiazm.onion) is not coming back.
Thanks for all the fish.
Regards
Alain
On 22.08.20 16:00, Alain Wolf wrote:
> Hi list
>
> I had to temporarily turn of my key-server service on pgpkeys.urown.net.
>
> The recon service refused to ope
Hi list
I had to temporarily turn of my key-server service on pgpkeys.urown.net.
The recon service refused to operate since last night ("PTree may be
corrupted").
I'm in the process of obtaining a fresh dump and will then try to
rebuild the db.
Hopefully the service will be back soon.
Regards
Hello Guys, hello Kristian
Just a minor issue but I was wondering ...
On my sks-keyservers.net status page for pgpkeys.urown.net, the server
pgp.uni-mainz.de is listed as peer (without cross-peering). But I far as
my brain and my mailbox recall, was never in my membership file.
Regards
Alain
Hi Andrew
Am 18.01.19 um 13:05 schrieb Andrew Gallagher:
> Hi, all.
>
> I extended the expiry on my key (0xfb73e21af1163937) over a week ago and
> uploaded it to the pool. I foolishly thought that doing so a few days in
> advance of its expiry would be sufficient. Not so. Even today, I see
> that
Hello Abizer
I tried to answer your peering request, but the mail bounced.
Forwarded Message
Subject: Re: [Sks-devel] seeking peers for pgp.ocf.berkeley.edu
Date: Wed, 2 Jan 2019 14:51:00 +0100
From: Alain Wolf
To: OCF Keyserver Admin
> Your keyserver has been added to
Hi
Am 24.08.2018 um 14:36 wrote Kristian Fiskerstrand:
> On 08/24/2018 11:36 AM, Gabor Kiss wrote:
>> A question:
>> Does an SKS cluster need multiple storage space,
>> or nodes can share the database?
>
> the DB/storage needs to be separate, but it doesn't require multiple VMs
> although I tend
Hello PGP Key Server Administrator
I don't think this setup will make it into the pool:
* pgp.securitytext.org points to a Cloudflare IP, which does not answer
to OpenPGP clients on TCP port 11371.
* I can't connect to dualstack.pgp.securitytext.org, neither on TCP
port 11370 nor 11371
Hey
On 09.02.2018 16:15, David Néel wrote:
>
> I'll do it in the beginning of the next week as my wedding is tomorrow :)
>
> Please stay peer. I'll be back soon.
Your honeymoon would need to last longer then 90 days, before you would
be de-peered from pgpkeys.urown.net
Best wishes
A.
--
pgp
Hi Hendrik
Me again.
On 23.01.2018 21:48, Hendrik Visage wrote:
> Hi there,
>
> Anybody else running a SKS behind a NAT firewall?
I do.
> Could you perhaps share any advice on the recon/hkp settings? (I’ll be
> setting up/running nginx reverse proxy for HKP)
Nothing unusual on the router/fir
On 23.01.2018 17:18, Daniel Kahn Gillmor wrote:
> On Tue 2018-01-23 10:51:54 +0100, Alain Wolf wrote:
>> I would try to change desired filepaths in
>> debian/patches/0001-use-debian-fhs.patch
>
> Hi there--
>
> I'm one of the current maintainers of the debian pack
Hey
On 23.01.2018 08:06, Hendrik Visage wrote:
> Good day,
>
> Busy setting up a SKS keyserver, and wants to have a separate /sks
> filesystem, and before I start to add symlinks
> all over the place, or re-compile SKS, I was wondering how/where to
> override the defaults in the configuration fi
On 14.01.2018 16:55, Kristian Fiskerstrand wrote:
>
> That said I'm a bit surprised about this discussion, nobody is required
> to use a single pool of keyservers.
>
That is certainly not the direction I wanted it to go with my initial post.
I personally, and I assume must of us, welcomed the
On 11.01.2018 18:16, Alain Wolf wrote:
>
> Opinions, ideas anyone?
>
Maybe something along the line of ...
1) Server operator puts his PGP fingerprint in the servers contact
information (as we do today but would need to be mandatory HKPS).
2) Server operator creates server privat
On 11.01.2018 20:06, Andrew Gallagher wrote:
> On 11/01/18 17:16, Alain Wolf wrote:
>> I don't know how Kristians SKS CA came to existence. Maybe it was about
>> avoiding additional costs for the volunteers, maybe about trust (or lack
>> of it) in the commercial CA
On 11.01.2018 17:28, Timothy A. Holtzen wrote:
>
> For HKPS Kristian Fiskerstrand is the one maintaining the CA. I believe
> you can generate a CSR and send it in an encrypted message to him and he
> will send you back the signed certificate.
>
> I would definitely say there is more need of
On 11.01.2018 02:00, brent s. wrote:
> how many keys did you import so we know what your delta is?
+443
https://sks-keyservers.net/status/ks-status.php?server=sks-bom.semperen.com
--
pgpkeys.urown.net 11370 # 0x27A69FC9A1744242
signature.asc
Description: OpenPGP digital signature
you can use: https://cdn.fstatic.io/sksdump
>
I removed pgp.key-server.io from the list of dumps in the Wiki.
He is missing keys for several months now.
> My peering lines:
>
> keys.flanga.io 11370 # Flanga SKS Peering Administrator
> 0xd015c49b2eceb8f1
> keys2.flanga
sks-keyservers.net status page no longer shows any error.
[1] https://sks-keyservers.net/status/ks-status.php?server=pgpkeys.urown.net
[2] https://pgpkeys.urown.net/pks/lookup?search=yahoo.com
Regards
Alain
--
# pgpkeys.urown.net 11370 # Alain Wolf
0x27A69FC9A1744242
signature.asc
Descript
ar/lib/sks/DB and /var/lib/sks/PTree.
On my server ...
du -hs /var/lib/sks /var/spool/sks/
19G /var/lib/sks
508K /var/spool/sks/
--
# pgpkeys.urown.net 11370 # Alain Wolf 0x27A69FC9A1744242
#!/bin/sh
# daily cron to cleanup DB's log files.
set -e
[ -r /etc/sks/cron.conf ] &a
om the status
page list, from the list of my peers on [1] and if I open the url
directly it shows another server [2].
[1] https://sks-keyservers.net/status/ks-status.php?server=pgpkeys.urown.net
[2] https://cloud.urown.net/s/fuJPFG9JY53Voaj
--
# pgpkeys.urown.net 11370 # Alain Wolf 0x27A69FC9A1744242
signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am 25.02.2017 um 13:15 schrieb Hillebrand van de Groep:
> I have loaded a keydump from
> https://keyserver.mattrude.com, dated Sun Feb 19 08:00:01 UTC 2017.
>
Nice to see mattrude.com is back again.
Welcome back Matt :)
- --
# pgpkeys.urown.
Am 17.08.2016 um 06:29 schrieb Gabor Kiss:
>> sks-peer.spodhuis.org has just had a purge of peers which are down; this
>> has changed the amount of time spent trying to reconcile with dead
>> hosts, so that more time is available for reconciling with live hosts.
>> I'm seeing quite a few keys flow
json.php?server=YOUR_SERVER_NAME
Keyword:
"Last_status":"OK"
Alert When:
Keyword Not Exists
Monitoring Interval:
every 60 minutes
Select your "Alert Contacts To Notify"
Save Changes
Done
Regards
Alain
P.S
More peers are always welcome:
pgpkeys.uro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 30.04.2016 at 17:29, James Cloos wrote:
>> "KG" == Kiss Gabor (Bitman)
>> writes:
>
> KG> I found requests for https://keys.gnupg.net/ in my Apache logs
> KG> on keys.niif.hu. Of course they were unsuccessful because KG>
> my HTTP dae
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 14.11.2015 at 01:23, Christoph Anton Mitterer wrote:
> On Sat, 2015-11-14 at 01:15 +0100, Hendrik Grewe wrote:
>> I would imagine not leaving the tor network through an exit is the
>> benefit.
> And what should be the benefit of that?
What is the
r port 11371; is that expected?
>
Hello Chris
It is, but pgpkeys.ch has Strict-Transport-Security enabled.
This creates the following issue, when you try to access it with a
modern browser:
https://lists.nongnu.org/archive/html/sks-devel/2015-05/msg00021.html
Salut
Alain Wolf
- --
Mail:
r port 11371; is that expected?
>
Hello Chris
It is, but pgpkeys.ch has Strict-Transport-Security enabled.
This creates the following issue, when you try to access it with a
modern browser:
https://lists.nongnu.org/archive/html/sks-devel/2015-05/msg00021.html
Greetings
Ala
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01.08.2015 at 16:25, Arnold wrote:
> On 19-07-15 17:58 +0200, Kristian Fiskerstrand wrote:
>
> Looking at https://sks-keyservers.net/status/ I see
>
>> These statistics were last updated: 2015-07-19 19:35 (UTC)
>
> Kristian, did you update s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 31.07.2015 at 01:05, Mike Forbes wrote:
> So now begins the task of trying to make HKPS and SSL and SKS all work
> together.
>
> Currently we're serving up our main pgp pages with our own SSL cert
> (https://pgp.net.nz)
>
> If we were to serv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am 17.05.2015 um 17:03 schrieb Alain Wolf:
> this blog post by Andy Steingruebl:
> http://securityretentive.blogspot.ch/2010/11/quick-clarification-on-hs
ts
> -http-strict.html
>
Sorry the link broke because of line-breaks int
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am 17.05.2015 um 23:29 schrieb Daniel Roesler:
> On May 17, 2015, Kristian Fiskerstrand wrote:
>>> 2. Prevents denial of service attacks that allows Mallory to
>>> spam a bunch of new subkeys, user ids, or huge images onto a
>>> public key.
>
>> P
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi all
I don't suppose that a lot of people a affected by this. But it doesn't
look nice so I had to do something about it. Maybe some of you are
interested.
If the domain of your keyserver has strict HSTS enabled it may create a
problem for browse
Service.
I have loaded a keydump from keyserver.mattrude.com, dated 2015-05-01.
I see 3,924,514 keys loaded.
For operational issues, please contact me directly.
pgpkeys.urown.net 11370 # 0x27a69fc9a1744242
pgpkeysximvxiazm.onion 11370 # 0x27a69fc9a1744242
Thank you,
Alain Wolf
33 matches
Mail list logo