-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On Tue, Apr 21, 2015 at 3:14 PM, Matt Wagner <matthew.wag...@acquia.com> wrote: > Neat! I played with this on a Pi (not in the pool), which seemed to work, > though the key import was very slow (probably due to the SD card). I'll > be interested to see how this works out. > >> PS: What magnitude of traffic do I have to expect from this experiment? > > I have haproxy stats at http://gpg.n1zyy.com:8002/ (though this doesn't > fully count recon traffic, I suppose). It's kind of messy; the 'sks' > column is what you want. ('main' is IPv4; 'ipv6' is obviously IPv6, and > 'sks' is the backend that they both speak to.) > > Looks like about 66GB over 112 days, so a bit over 500MB a day traffic. > I haven't actually watched this closely. I wonder if you could use haproxy as a non-http proxy for the recon traffic. Then you would get full statistics. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iF4EARYIAAYFAlU23QsACgkQN7lQes/yAW45xAEA4U9isyXtNr8tq5NMZInETsGp MWfmEMVTYedsJUoje7sBAPLA83SPGXfI6B8cjL5QZcC28oMre2uCvyxPhT3LQe8P =bhLV -----END PGP SIGNATURE----- _______________________________________________ Sks-devel mailing list Sks-devel@nongnu.org https://lists.nongnu.org/mailman/listinfo/sks-devel