sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] RFE for sks-keyservers.net (was Re: New Server)


From: Kristian Fiskerstrand
Subject: Re: [Sks-devel] RFE for sks-keyservers.net (was Re: New Server)
Date: Sat, 28 Apr 2012 16:22:00 +0200
User-agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20120312 Thunderbird/11.0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 28.04.2012 16:16, Jeffrey Johnson wrote:
> 
>>> 

...

> 
> In order to resurrect the membership file, I grep'ed
> "unauthorized" out of recon.log, adding IP addresses until messages
> went away, and then set about manually reconstructing FQDN. More
> tedious than hard.
> 
> What was really ultimately most useful was the meta columns on
> your status pages in identifying the desired FQDN for various IP
> addresses I could not reverse to FQDN.
> 
> Here is the RFE of sks-keyservers.net <http://sks-keyservers.net>:
> 
> Would it be possible to pull a syntactically accurate membership
> file directly from sks-keyservers.net <http://sks-keyservers.net>?
> 

Feel free to post the RFE in the issue tracker [1] - however, I can't
promise that this will get a high priority.


> And here is another RFE that might help with identifying aliasing
> issues, particularly with IPv6:
> 
> Perhaps its time to generate/publish some unique host id that can 
> be remotely accessed through HKP for disambiguating aliasing.
> 

This is where using the Hostname: specified in the status page [2]
helps. No matter what alias is used to access the server, this will be
the same.


[1] http://code.google.com/p/sks-keyservers-pool/issues/list
[2] http://keys.kfwebs.net:11371/pks/lookup?op=stats

- -- 
- ----------------------------
Kristian Fiskerstrand
http://www.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Corruptissima re publica plurimæ leges
The greater the degeneration of the republic, the more of its laws
- ----------------------------
This email was digitally signed using the OpenPGP
standard. If you want to read more about this
The book: Sending Emails - The Safe Way: An
introduction to OpenPGP security is now
available in both Amazon Kindle and Paperback
format at
http://www.amazon.com/dp/B006RSG1S4/
- ----------------------------
Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBCAAGBQJPm/0IAAoJEBbgz41rC5UIQUcP/3Sj5lApRcO/f3cZu7l5haWz
HV7LUw1qkxrY7bfVH5J8JBKpSDXT3e7xvJX/ErsVw524ItsAYnvrgS81JhU2vcIb
xQ8R4LpwvxNeXavPt8BR8PciEpSwu3ruyOlq+riOQLOHalVhvEtZjBVFS1RtEXUf
u6s5HkUb7NmPTFhOkg6kARU3bUXqa9U7tcEK+r4wJYfRpEk0lLk2l8ObE/S0mjpQ
v8fEoZypiF3hzCWaFvjQ3j/c7pIh96zjzO6tJ/jg37V0iSYyejbj+OHXGPJa8LVL
1vIGyvYF/6ekjjQ4G1ZMxptNGqVFRbUHPsog/zpuaqc+/+ngZ/uddqic0L2iRXU/
2mcOkccXYHVQ7lIHXKowGQs+H2K4G+irlxeu6KbBjv9epxJZJPx+ZiVi4e7A/VAU
HjW9GOzxuJNuyG+bpbxcVB39bh9tO7jEEFRPflylXTCws5dCRSvuF1KlWLlU0yLS
/h5ET6haZf2Sb/+n1IRxfuPm37b64gqpGyIvCBKtWL8LFxttiHvZffxYxXkv8CS3
6FK56SEGiUQIBaGwylG6qIT4AbKD0lid/K+Y0PezKysUHrtjoBHhJJF9daLMtU9w
RyScZvWuZp+BgONVfk6rsAhAA4ABEjHT107FsnCVXt4PTLf/zuWgBZpOJh+PUY7X
+t/2/qtX2lBOHTnF3lrx
=kTjY
-----END PGP SIGNATURE-----




reply via email to

[Prev in Thread] Current Thread [Next in Thread]