sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] peering broken for keyservers using reverse-proxies?


From: Kristian Fiskerstrand
Subject: Re: [Sks-devel] peering broken for keyservers using reverse-proxies?
Date: Mon, 09 Apr 2012 22:33:35 +0200
User-agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20120312 Thunderbird/11.0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05.04.2012 02:02, Ryan wrote:
> I had problems reverse proxying 11371 behind a load balancer; would
> break other sks servers fetching keys.
> 
> What I ended up doing was configure SKS to use 21371 on external
> interface and the proxy on 11371;  other SKS servers started
> fetching keys off 21371 and bypassing the proxy yet clients always
> hit the proxy.
> 
> I think the issue was fixed in latest SKS but alot of servers are
> not running it yet so this is my work-arround.

Ditto for me, although on port 11372. This is, however, firewall
restricted to IPs of my peers.

- -- 
- ----------------------------
Kristian Fiskerstrand
http://www.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Corruptissima re publica plurimæ leges
The greater the degeneration of the republic, the more of its laws
- ----------------------------
This email was digitally signed using the OpenPGP
standard. If you want to read more about this
The book: Sending Emails - The Safe Way: An
introduction to OpenPGP security is now
available in both Amazon Kindle and Paperback
format at
http://www.amazon.com/dp/B006RSG1S4/
- ----------------------------
Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=KQ21
-----END PGP SIGNATURE-----




reply via email to

[Prev in Thread] Current Thread [Next in Thread]