-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


On Tue, Apr 21, 2015 at 3:14 PM, Matt Wagner
<matthew.wag...@acquia.com> wrote:

> Neat! I played with this on a Pi (not in the pool), which seemed to
work,
> though the key import was very slow (probably due to the SD card).
I'll
> be interested to see how this works out.
>
>> PS: What magnitude of traffic do I have to expect from this
experiment?
>
> I have haproxy stats at http://gpg.n1zyy.com:8002/ (though this
doesn't
> fully count recon traffic, I suppose). It's kind of messy; the 'sks'
> column is what you want. ('main' is IPv4; 'ipv6' is obviously IPv6,
and
> 'sks' is the backend that they both speak to.)
>
> Looks like about 66GB over 112 days, so a bit over 500MB a day
traffic.
> I haven't actually watched this closely.

I wonder if you could use haproxy as a non-http proxy for the recon
traffic.  Then you would get full statistics.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iF4EARYIAAYFAlU23QsACgkQN7lQes/yAW45xAEA4U9isyXtNr8tq5NMZInETsGp
MWfmEMVTYedsJUoje7sBAPLA83SPGXfI6B8cjL5QZcC28oMre2uCvyxPhT3LQe8P
=bhLV
-----END PGP SIGNATURE-----

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to