t
> come back?
Will need to find another tunnel provider (he perhaps) in that case
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keys
come back?
>
fwiw, this is sixxs response:
VM is having issues, will likely come back when it is resolved. No
guarantees though, please do Call Your ISP and read the articles on our
news page.
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twi
hanks to a donated VM with native IPv6 connectivity I've now rewritten
the scripts to allow for an external query and IPv6 functionality should
be back up for the pools.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
On 11/10/2016 11:46 AM, Danny Horne wrote:
> On 04/11/2016 11:40 am, Kristian Fiskerstrand wrote:
>> On 10/28/2016 02:22 PM, dirk astrath wrote:
>>> Hello,
>>>
>>>>> Seems IPv6 connectivity is borked on https://sks-keyservers.net/status/
>>&g
been stuck at 300 for a few days
> now (maybe longer). I'm sure this used to change on every hourly check,
> and I've seen it go into four figures before now.
300 is the minimum diff used, so it just means the variance in the pool
is good enough to be within that.
--
-
On 11/11/2016 07:48 PM, Danny Horne wrote:
> On 11/11/2016 8:15 am, Kristian Fiskerstrand wrote:
>> On 11/10/2016 07:05 PM, Danny Horne wrote:
>>> Hi all,
>>>
>>> Recently I've been seeing my keyserver fall off the list due to 'missing
>>
I crontab it on hourly
basis
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
"By three
On 11/13/2016 08:24 PM, Danny Horne wrote:
> On 13/11/2016 2:47 pm, Kristian Fiskerstrand wrote:
>> How often are you updating the stats? default is only update once a day,
>> you can issue a SIGUSR2 to update it more often, I crontab it on hourly
>> basis
>>
>>
ccessed
> when it is supposed to be accessed (every hour around minute 35); Do you
> know what may be the cause of sks-keyservers.net missing to access
> status page of pgp.key-server.io?
> Thank you for your time''
http://dnsviz.net/d/pgp.key-server.io/dnssec/
"key-
54.24.22.122)
172.818 ms
20 te0-0-2-2.nr11.b001202-4.lax01.atlas.cogentco.com (154.24.22.122)
170.866 ms * 171.129 ms
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
seems somewhat stuck around LAX
--
----
Kristian Fiske
to be some HSTS setup blocking access to
http://keys.vsund.de:11371/pks/lookup?op=stats ?
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB
On 11/19/2016 12:55 AM, Kristian Fiskerstrand wrote:
> On 11/19/2016 12:43 AM, Valentin Sundermann wrote:
>> Hi,
>>> Do you mind me asking how you got those charts on your page? Tried the
>>> Github files linked to at the bottom but they only appear to give me a
&g
might be interested in the [munin plugins for sks]
see example [0,1]:
[munin plugins for sks]
https://git.sumptuouscapital.com/?p=munin-sks.git;a=summary
[0]
https://download.sumptuouscapital.com/sks/munin_sks/sks_daily_keys-week.png
[1]
https://download.sumptuouscapital.com/sks/munin_sks/sks_number_keys-
On 11/20/2016 07:01 PM, Audun Larsen wrote:
> Hi,
>
> I am looking for peers for a new SKS keyserver installation.
>
> I am running SKS version 1.1.6, on keys.drup.no.
> This is a private server physically located in Bergen, Norway.
Added it to my server in Oslo, Norway
# Kri
Dear DNS Admins. Due to an unexpected IP change overnight, please update
configurations to allow 37.191.238.78 instead of 37.191.220.247
I'm currently working on re-configuring the rest of the system, which is a bit
delayed due to travelling activity today.
[Sent from my iPad, as it is not a se
On 12/14/2016 11:08 AM, Christoph Egger wrote:
>
> Kristian Fiskerstrand writes:
>> if you find any information un-expected send a response and request a signed
>> confirmation]
>
>> Unexpected IP change
>
> Almost Ironic ;-)
Blame silly openkeychain
ttach those to another person's key, and that's the only attack
> scenario I can see.
>
Without verifying the signature this opens up for a DoS on users
expecting to distribute the keys, e.g in case of a revocation certificate.
--
Kristian Fiskerstr
mind?
If any third party can add a non-verified signature that effectively
either stops updates of or deletes the key from a server?
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP
user into importing a
package that hinders distribution of the keyblock , and then later on
the user revokes the keyblock and believes it gets uploaded to keyserver
with the modified packet but at that point it is rejected?
--
----
Kristian Fiskerstrand
Blog: https://blog.sump
notation might not be rejected by a client (is it critical
marked?). Is there a reference for this behavior in RFC and tested on
various implementations?
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Publi
ough
(I seem to recall doing it at one point just to test a bit) - but it
doesn't improve security in any form.
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://p
e keyservers by hand without
understanding the implications to begin with, making it more "user
friendly" seems counter intuitive in that context.
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Pu
Dear DNS Admins. Due to an unexpected IP change overnight, please update
configurations to allow 37.191.236.118 instead of 37.191.238.78
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP
dication that added complexity has any value at all. In most cases ECC
is lower security margin for lower interoperability. I'm still not
convinced we have anything to gain by doing any dual-stack approach that
also includes an increased workload to manage the certs.
--
--
On 04/02/2017 06:00 PM, Pete Stephenson wrote:
> On Sun, Apr 2, 2017 at 12:44 PM, Kristian Fiskerstrand
> wrote:
>> On 04/02/2017 07:07 AM, Phil Pennock wrote:
>>> We need to know it won't break clients. So, setting up a keyserver
>>> where dual-stack is
f
others have identified interesting behavior from certain clients.
As for gateway solutions , as far as I'm aware at least Symantec Encryption
Server (former PGP Universal) only check LDAP (and not that either by default),
but peripdic keyyring refreshes etc is natur
[Sent from my iPad, as it is not a secured device there are no cryptographic
keys on this device, meaning this message is sent without an OpenPGP signature.
In general you should *not* rely on any information sent over such an unsecure
channel, if you find any information controversial or un-e
es, it was an instance of a one line patch can never go wrong...
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35
prings to mind is multiple instances of SKS behind the
reverse proxy to distribute the load (I run two instances myself - and
that is for lesser load). Would just need separate key port and do local
reconciliation only between them necessary , can make sure stats page
(?op=stats) only reaches the pri
me
was introduced for these setups, so hostname is the shared cluster
addresse whereby nodename can be used to identify specific nodes.
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
them given their own trustdb/wot calculation rather than
relying on a third party that doen't provide a security assertion to
begin with.
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP
]
https://bugs.gentoo.org/show_bug.cgi?id=591326
[1]
https://caml.inria.fr/mantis/view.php?id=6517
[2]
https://bitbucket.org/skskeyserver/sks-keyserver/issues/42/unbundle-cryptokit-sks-incompatible-with
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapi
rrected again on next run
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
"Better to keep yo
begin with).
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
"If you choose to sa
On 06/20/2017 05:56 PM, Ari Trachtenberg wrote:
> Not quite ... each server can decide which keys it want s to accept.
> Bad actors will eventually fall out of favor with the others.
Now we presume a non-gossiping system of isolated servers
--
----
Kristian Fisker
the site just the
same; and the full data set is available and part of regular workflow
for bootstrapping own servers.
References:
[added it now]
https://git.sumptuouscapital.com/?p=sks-keyservers-pool.git;a=commit;h=b98e7522990961541165dfc23781a45a1a5e05a9
--
----
Kristi
k you for heads up, given that robots.txt wasn't previously tracked
but created directly on server there ended up a conflict on update for
the file...
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
On 06/26/2017 06:16 PM, Andrew Gallagher wrote:
> OCaml appears to make (dis?)optimisations that trigger a rare Intel
> hyperthreading bug with increased probability.
The way I'm reading it is; When ocaml breaks it is due to a processor
misbehaving :)
--
--
beddcd
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
"Money is better than poverty,
dness, could result in exclusion from the pool.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35
On 07/15/2017 01:34 PM, Kristian Fiskerstrand wrote:
> On 07/15/2017 11:39 AM, Moritz Wirth wrote:
>> Good morning everybody,
>>
>> is it possible to loadbalance SKS/Nginx using multiple A records for the
>> hostname?
>
> The keyserver pools operate as
he "missing" Host field).
>
>The IP that is querying my server belongs to Amazon's AWS. Requests
>look
>the same, every 2 seconds a "GET /".
>
>
>>> There might be a clue in the host header if you could log that? I
>use
>>> this nginx
ii) possibly invalidates (i) and (ii) as the workflow is
simplified (hg export), so in terms of the processes of commits and we'd
avoid any move (wiki and issue tracker stays the same).
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptu
On 08/08/2017 03:27 PM, Kristian Fiskerstrand wrote:
> There are likely a few different questions resulting from this (my own
> opinions in separate email).
And here they come
> (i) Should we use git for revision control instead of mercurial?
I'm personally more involved in proj
On 08/08/2017 03:27 PM, Kristian Fiskerstrand wrote:
> that is added
> as a single commit upon qmerge
To avoid any ambiguity, this should be qfinish... qmerge is similar step
in the Gentoo Portage process...
--
----
Kristian Fiskerstrand
Blog:
m mercurial queues etc.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
--
ith due to social graph leak.
... noting of which is a result of the choie of VCS impacting this to a
great extent. If anything we'd need to rewrite the full codebase in C
for such an argument to be made.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumpt
fault
11371) to your peers at least to allow exchange of some public keyblocks.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109
devel/2017-September/033063.html
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED
or membership in all the
> pools.
already done
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8
increase in requirement in main pool will
automatically affect the subpools.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 561
tal.com/tmp/Screenshot_2017-10-04-08-52-45.png
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
"W
sks_server_primary are defined as upstream
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
On 10/04/2017 02:52 PM, Frank de Bot wrote:
> Wouldn't this cause to also route a search with 'stats' only to the
> primary server? ;-)
$arg_op in this case actually means "?op" as key, its not an arbitrary
key in the querystring :)
--
----
though, hopefully that
sorts it.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
---
nfo on
manual procedure in UPGRADING file, specifically look for db5.3_archive
or similar for your distribution (there are some differences in naming
conventions etc for multiple versions)
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @k
On 12/08/2017 08:34 PM, Fabian A. Santiago wrote:
> is there any reason to enable mailsync functionality? does anyone out there
> still use it?
tl,dr; No
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @k
existing data stores. Some changes to config
requires recreating the BDB environment, which can be done using the
UPGRADING procedures, but you'd mostly need to do that if experiencing
issues / it not taking.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptu
Good that things are restored, but to try to debug this more generally,
can you confirm you used fastbuild rather than a full build originally?
In that case the offsets referenced can have been changed during this
process, and the behavior being within the expected behavior.
--
On 12/10/2017 11:20 PM, brent s. wrote:
> On 12/10/2017 05:15 PM, Kristian Fiskerstrand wrote:
>> Good that things are restored, but to try to debug this more generally,
>> can you confirm you used fastbuild rather than a full build originally?
>
> full build has always b
> this infrastructure.
That is actually a few years old, using the regular [trollwot]
>
> http://keys.niif.hu/pks/lookup?op=vindex&search=0x0B7F8B60E3EDFAE3
> (scroll down)
>
References:
[trollwot]
https://raw.githubusercontent.com/micahflee/trollwot/master/trollwot.pdf
-
On 12/18/2017 10:00 PM, Webmaster IspFontela wrote:
>
> The only change I've made has been to add 2 new peers
>
> What has happened?
Seems the stats page is a non-standard one so it just fails scraping the
data.
--
----
Kristian Fiskers
cripts distributed
>with
>> the SKS software package.
>>
>> I don't think I am really qualified for designing new security
>> protocols, but the idea doesn't go out of my head. Sorry for the long
>post.
>>
>> Regards
>>
>> Alain
>>
prised about this discussion, nobody is required
to use a single pool of keyservers.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:9
geographical sub-pools are doing anything re HKPS,
that is a single global pool.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3
On 01/14/2018 08:46 PM, Kristian Fiskerstrand wrote:
> From a privacy perspective, then yes, using HKPS transport is better,
> but it doesn't improve anything if malicious servers are included in
> some way that records information anyways, so having all servers
> included re
g who didn't know the first thing about security hardcoded
> that certificate into the software.
To make sure this isn't un-challenged in the archives, the secret key
never touches an online system, all operations are done on airgapped setup.
--
--
ck privately.
>
>Thanks
>
>EKG
I've gotten the emails :) still doing due dilligence for csr decision of
whether to sign or not, server is a bit nee and I prefer strongly connected
(wot strongset) operators
--
Kristian Fiskerstrand
Blog
e some archived DB files using db*_archive?
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618
pital.com/?p=munin-sks.git;a=summary
Keep in mind stats by default are updated once a day and by convention hourly
through system signals
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP c
for server stats, etc.
>
> Thanks for any pointers.
>
> EKG
Look at json format for &options=mr on a hockeypuck server
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock
On 02/15/2018 09:46 AM, Kristian Fiskerstrand wrote:
> On 02/15/2018 05:51 AM, Eric Germann wrote:
>> Good evening all,
>>
>> Are there any docs anywhere regarding the HTTP request that can be made on
>> port 11371?
>>
>> Specifically, wondering if /p
)
Now.. if anyone were to actually disable everything but 1.3, that'd be
exclusion worthy from the pool, but lets do this manually if so.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public
in the deluge of meltdown/spectre/memcached) so I don’t see the need/reason
> to disable TLS1.2
I was referring to server operators here, not clients, if that wasn't
clear :)
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
t responds to a specific alteration; mainly we need to specify a
specific filter for a specific version and move from there, which can be
relatively easy given sufficient time.
>
> --dkg
>
> [0] see for example
> https://bitbucket.org/skskeyserver/sks-keyserver/pull-request/20/trim
[Sent from my iPad, as it is not a secured device there are no cryptographic
keys on this device, meaning this message is sent without an OpenPGP signature.
In general you should *not* rely on any information sent over such an unsecure
channel, if you find any information controversial or un-e
torvalds-github/ and comments starting
with at least
https://github.com/torvalds/linux/pull/17#issuecomment-5654674
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://poo
ut the original report reads too
much like a rant and has insufficient info to comment much.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AF
anyways), but the whole GDPR is a
mess to begin with.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618
g. But it is so long ago I don't recall if we
checked if it was used everywhere.
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keys
misbehaving with
redirect for 11371 to 443
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B
On 05/20/2018 10:14 PM, Kristian Fiskerstrand wrote:
> On 05/20/2018 01:31 AM, Webmaster IspFontela wrote:
>>
>> Now we just need to find out why the server a.0.keysnode.ispfontela.es
>> on the list https://sks-keyservers.net/status/ has disappeared, I guess
>> th
be fine.
>
> More elaboration in German:
> https://netzpolitik.org/2018/bussgelder-bei-datenschutzverstoessen-angst-vor-einem-phantom/
>
>
> Disclaimer: IANAL. This is not legal advice.
>
>
>
> ___
> Gnupg-devel mailing l
On 06/19/2018 10:53 PM, Matthew Walster wrote:
> The keyserver status page seems broken also:
> https://sks-keyservers.net/status/
This was an intermittent failure, should be back up now.. Needed to
shift around some primaries to bootstrap the crawler.
--
----
Kr
On 06/19/2018 11:09 PM, Kristian Fiskerstrand wrote:
> On 06/19/2018 10:53 PM, Matthew Walster wrote:
>> The keyserver status page seems broken also:
>> https://sks-keyservers.net/status/
>
> This was an intermittent failure, should be back up now.. Needed to
> shift
On 06/19/2018 11:17 PM, Kristian Fiskerstrand wrote:
> On 06/19/2018 11:09 PM, Kristian Fiskerstrand wrote:
>> On 06/19/2018 10:53 PM, Matthew Walster wrote:
>>> The keyserver status page seems broken also:
>>> https://sks-keyservers.net/status/
>>
>> This
setup to allow gossipping), and servers
that do caching on the reverse proxy. Additionally low-CPU/low-memory
setups will not be permitted into the HKPS pool.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
On 07/03/2018 12:51 PM, Kristian Fiskerstrand wrote:
> Although the requirements to get included in the HKPS pool have so far
> been a bit subjective and changing over time as I've gotten more
> experience (and balancing out the requirements for the pool - it is not
> the point
e into hkps pool,
in particular since noticing an interesting feature if only one server
is included, which disables pool behavior in dirmngr and results in TLS
error / generic error due to CA pem not being loaded...
--
----
Kristian Fiskerstrand
for each node.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
"My father used to say
ustered setups are more important for the ecosystem than
even more individual servers.
> EKG
>
>
>> On Aug 23, 2018, at 9:49 AM, Kristian Fiskerstrand
>> wrote:
>>
>> On 08/20/2018 03:26 PM, Eric Germann wrote:
>>> I’ve reworked the keyserver fleet we’d pre
On 08/24/2018 06:56 PM, Kiss Gabor (Bitman) wrote:
> Dear Kristian,
>
> Page https://sks-keyservers.net/status/ contains no key servers.
Yup, I'm on it
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twi
On 08/24/2018 06:58 PM, Kristian Fiskerstrand wrote:
> On 08/24/2018 06:56 PM, Kiss Gabor (Bitman) wrote:
>> Dear Kristian,
>>
>> Page https://sks-keyservers.net/status/ contains no key servers.
>
> Yup, I'm on it
>
Not entirely sure what went wrong
-expected send a
response and request a signed confirmation]
> On 26 Aug 2018, at 18:44, Alain Wolf wrote:
>
> Hi
>
> Am 24.08.2018 um 14:36 wrote Kristian Fiskerstrand:
>> On 08/24/2018 11:36 AM, Gabor Kiss wrote:
>>> A question:
>>> Does an SKS cluster ne
d be the usual advantages if there are other outages, e.g
during system upgrade, but for the purposes we're talking it just needs
to be multiple instances.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
On 7/3/18 11:01 PM, Phil Pennock wrote:
> On 2018-07-03 at 12:51 +0200, Kristian Fiskerstrand wrote:
>> However, going forwards I'm going to request additional information
>> about the server hardware (already requesting info on line capacity for
>> SRV pool purposes)
r-network-and-its-maintainers-dont-fd829297d75e
>>
This is the email correspondence involved;
https://download.sumptuouscapital.com/tmp/re_new-article.eml.txt
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
---
eing a part of
the ecosystem (as long as users understand their position).
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 561
On 11/16/18 2:08 AM, Matthew Walster wrote:
> Good lord, Kristian, you have to deal with these people on a regular basis?
Yes
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock
for 10 minutes in nginx, which really makes life more pleasant.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B6
201 - 300 of 614 matches
Mail list logo