Re: Flooding attack against synchronising keyservers

2023-04-21 Thread Andrew Gallagher via SKS development and deployment list
Hi, all. pgpkeys.eu is fully operational, is accepting key submissions and is syncing with two similarly recovered peers. The number of keys in the dataset is back to pre-flooding levels, and site reliability has been significantly improved. If you are an operator and need assistance

Re: Flooding attack against synchronising keyservers

2023-03-28 Thread Iñaki Arenaza
On mar, mar 28 2023, H.-Dirk Schmitt wrote: > As adviced I temporarily disabled the peers on > keyserver{1,2}.computer42.org. Same for keys.escomposlinux.org > Waiting for a better solution … Let's hope there is one... Best regards, Iñaki. signature.asc Description: PGP signature

Re: Flooding attack against synchronising keyservers

2023-03-28 Thread H.-Dirk Schmitt
As adviced I temporarily disabled the peers on keyserver{1,2}.computer42.org. Waiting for a better solution … Best regards, H.-Dirk -- H.-Dirk Schmitt Dipl.Math. eMail:dirk.schm...@computer42.org mobile:+49 177 616 8564 phone: +49 2642 99 41 14 fax: +49 2642 99 41 15 Schillerstr.

Flooding attack against synchronising keyservers

2023-03-27 Thread Andrew Gallagher via SKS development and deployment list
Hi, everyone. The synchronising keyserver network has been under an intermittent flooding attack for the past five days, resulting in the addition of approximately 3 million obviously-fake OpenPGP keys to the SKS dataset. The fake keys are currently being submitted multiple times per second