sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] peering broken for keyservers using reverse-proxies?


From: John Clizbe
Subject: Re: [Sks-devel] peering broken for keyservers using reverse-proxies?
Date: Wed, 04 Apr 2012 18:27:14 -0500
User-agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.20pre) Gecko/20110606 Mnenhy/0.8.5 SeaMonkey/2.0.15pre

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1,SHA256

Christoph Egger wrote:
> Hi!
> 
>   Recently I started to see failures in my recon.log:
> 
> 2012-04-04 23:35:59 Error getting missing keys: Failure("<!DOCTYPE HTML 
> PUBLIC \"-//IETF//DTD HTML 2.0//EN\">")
> 2012-04-05 00:57:10 Error getting missing keys: Failure("<html>\r")
> 
>   Interestingly all peers I'm seeing this kind of failure are marked as
> using reverse-proxies on http://sks-keyservers.net/status/ -- is this
> setup in some way broken?

Is the recon port being forwarded? I saw where 11371 was, but not 11370.

That would be the first place I'd check. If that doesn't fix it, 11370 will
probably need to be passed directly to the server.

- -John

- -- 
John P. Clizbe                      Inet: John (a) Gingerbear DAWT net
John ( @ ) Enigmail DAWT net          or: John (@) Keyservers DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
     mailto:address@hidden

                   Cowboy Haiku -- Reflections on Rodeo
So many Cowboys. / Round Wrangler butts drive me nuts. / Never enough rope.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12-git-509fe4ce-2012-01-31 (Windows XP)
Comment: When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl!
Comment: Be part of the £€€7 ECHELON -- Use Strong Encryption.
Comment: It's YOUR right - for the time being.
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJPfNjPAAoJECMTMVxDW9A0lTYH/1uVN8M0YhOwvQNAd7szj0HL
0Uj+QlQRHtTXIH1LUtz5nUxD8VE0hUgUcr3Xl+7JCeC27/4pQ4bWIFMRAYJwgFTI
T/oc2mRSq3knbhzkKIoz5GZ7mi2BcYhQt+Ox+rAzl9ZXZNAqZHlGXNnF3AOyIA/O
NJ0STH7BARQohfe2gIaR1T/wUglqoEghXEZRUQw0xlGinWxy5Vz1kAexzMB/FX7/
Z6zTQXI+UPNx7ZbxdmEMIgBx3isCIgqtCAZsGFH+vs7kYPhDWQo5BekNlF1NTHdO
V1DyAt3/xiN7sJl3PmUDWvtZdWtpUHP4MZicGJgGDEcA4kOmLk9c2blBY7VtPg2I
XgQBEQgABgUCT3zYzwAKCRDrXhnz1laYJbIhAP9ZbOsI7fA/n/vOXKriDrPIP/kq
0MKSa/BJjWimgsGq6wD/fOkCxNMAtimg1Zsh+XbEs5pRdKQHovD22W4AHR6mOzo=
=Leap
-----END PGP SIGNATURE-----



reply via email to

[Prev in Thread] Current Thread [Next in Thread]