Re: [Sks-devel] Peering Issues - High IO ending with Eventloop.SigAlarm always occur with 1 peer

2018-12-13 Thread Moritz Wirth
Hi, this issue already known for several months now - see [0], [1]. The keys used for this are very large (around 30-60MB). Syncing them takes some bandwith and indexing/writing them to the disk consumes a lot of CPU and I/O resources. If the addition to the database fails, the key is added

Re: [Sks-devel] Withdrawal of Service - keys.flanga.io

2018-11-15 Thread Moritz Wirth
. > > > On Fri, 16 Nov 2018 00:50:31 +0100 > Moritz Wirth wrote: > >> I asked to be allowed to share some more details, however the request >> was to remove/prevent indexing of 2 keys stored on our keyservers - >> including copies of ID's to verify the request as

Re: [Sks-devel] Withdrawal of Service - keys.flanga.io

2018-11-15 Thread Moritz Wirth
mode of operation dictate and stay this way. >> >> -- >> >> Thanks, >> >> Fabian S. >> >> OpenPGP: >> >> 0x643082042DC83E6D94B86C405E3DAA18A1C22D8F >> >> On Thu, Nov 15, 2018 at 5:58 PM, Georg Faerber wrote: >> >>> Hi

[Sks-devel] Withdrawal of Service - keys.flanga.io

2018-11-15 Thread Moritz Wirth
Hello, keys.flanga.io will cease operation - we received a request to remove some keys and since we are unable to do this, we will shutdown all keyservers and erase all relevant databases immediately. Best Regards, Moritz signature.asc Description: OpenPGP digital signature

Re: [Sks-devel] setting up hockeypuck keyserver

2018-09-02 Thread Moritz Wirth
run as hockeypuck user. > > You need to create an hkp dB and hockeypuck role and grant > ownership over the dB (at least that worked for me).  > > Otherwise, it’s working and importing now. Thanks for your > help. I’ll advise when it’

Re: [Sks-devel] setting up hockeypuck keyserver

2018-09-01 Thread Moritz Wirth
You have to set the filters to get the reconciliation working with SKS: [hockeypuck.conflux.recon] reconAddr=":11370" version="1.1.6" filters=["yminsky.dedup", "yminsky.merge"] For Postgresql: [hockeypuck.openpgp.db] driver="postgres-jsonb" dsn="database=hkp host=/var/run/postgresql port=5432

Re: [Sks-devel] Withdrawal of service: keys2.flanga.io & keys3.flanga.io

2018-07-19 Thread Moritz Wirth
to protect yourself during the attack? > > > > On 17/07/18 13:17, Moritz Wirth wrote: >> Hi, >> >> keys2.flanga.io and keys3.flanga.io will cease operation immediately, >> given the latest problems. >> >> keys.flanga.io will remain online as long as it r

[Sks-devel] Withdrawal of service: keys2.flanga.io & keys3.flanga.io

2018-07-17 Thread Moritz Wirth
Hi, keys2.flanga.io and keys3.flanga.io will cease operation immediately, given the latest problems. keys.flanga.io will remain online as long as it runs stable and the required disk space does not exceed my limits (database capacity has almost tripled when switching to hockeypuck and is now

Re: [Sks-devel] withdrawal of service: sks.spodhuis.org

2018-07-15 Thread Moritz Wirth
Hi Tom, I spend the night on the keydump - keys.flanga.io is now also running with hockeypuck (I did not test anything to be honest though ;)). I'll see if it runs stable (not sure if it is pool compatible) - version is 1.1.6. A short write-up for installing this thing is already done - I can

Re: [Sks-devel] withdrawal of service: sks.spodhuis.org

2018-07-14 Thread Moritz Wirth
id "simple" and "resilient" rather than "with > nearly optimal communication complexity", and the contents matched the > title.  > > The pool of engineers willing and able to get us out of this mess > would be much larger. > > On Fri, Jul 13, 2018 at 11:2

Re: [Sks-devel] withdrawal of service: sks.spodhuis.org

2018-07-13 Thread Moritz Wirth
FWIW, has anybody even started working on a fix for any of the bugs? Am 13.07.18 um 21:52 schrieb Robert J. Hansen: >> Sad but not surprised. Thanks for all your time and effort. It has been much >> appreciated. > Yes. > >> I am reluctant to declare defeat, but this calls for a tactical

Re: [Sks-devel] Causes of "Vulnerable to CVE-2014-3207" flag in https://sks-keyservers.net/status/ks-status.php?server= page

2018-06-30 Thread Moritz Wirth
Are you sure that this is a problem of the CVE Vulnerability and not because of a non responding keyservers? Am 30.06.18 um 20:29 schrieb Eric Germann: > Thanks > > So I should download all the source from the git repo as it seems 1.1.6 > doesn’t have the fixes? > >> On Jun 30, 2018, at 13:55,

Re: [Sks-devel] SKS intermittently stalls with 100% CPU & rate-limiting

2018-06-21 Thread Moritz Wirth
I am afraid there is not much you can do about this right now - the pool itself is very unstable and crashes multiple times per day. I found over 8 key hashes which cause an Eventloop - this happens every 2-3 minutes, sometimes with the same key, sometimes with other keys.  Best regards, Am

Re: [Sks-devel] One Way replication (for test environments)

2018-06-18 Thread Moritz Wirth
We are running a normal sks instance to keep up with the peering - the instance is stopped every hour and a snapshot of the database is created - the snapshot is then used in another VM for testing. Am 18.06.18 um 12:27 schrieb Andrew Gallagher: > On 18/06/18 11:11, Hendrik Visage wrote: >>> On

Re: [Sks-devel] SKS intermittently stalls with 100% CPU & rate-limiting

2018-06-17 Thread Moritz Wirth
e their huge amount of queries, but I have no > real way of communicating that with them. I'd love to slow down their > queries (tarpitting, maybe?) to minimize excess resource consumption > while still answering their queries as opposed to just cutting them off > once they hit a rate limit

Re: [Sks-devel] SKS intermittently stalls with 100% CPU & rate-limiting

2018-06-16 Thread Moritz Wirth
Hi, seems like that is the "problem": https://bitbucket.org/skskeyserver/sks-keyserver/issues/60/denial-of-service-via-large-uid-packets https://bitbucket.org/skskeyserver/sks-keyserver/issues/57/anyone-can-make-any-pgp-key-unimportable Best regards, Moritz Am 17.06.18 um 02:18 schrieb Pete

Re: [Sks-devel] disk full, keys.niif.hu crashed

2018-06-15 Thread Moritz Wirth
FWIW, you can set the DB_LOG_AUTOREMOVE flag for the database - the logs should be removed automatically [root@instance-4 ~]# cat /var/lib/sks/KDB/DB_CONFIG set_flags   DB_LOG_AUTOREMOVE Best regards, Am 15.06.18 um 09:40 schrieb André Keller: > Hi, > > On 15.06.2018 05:54, Kiss

Re: [Sks-devel] pool status page, not recognizing hkps

2018-06-05 Thread Moritz Wirth
This is a pool containing only servers available using hkps. Regular A and and SRV records are included for port 443 servers, and a lookup is performed for _pgpkey-https._tcp on the individual servers to determine if a hkps enabled service is listening on another port. At this point, however,

Re: [Sks-devel] Strange case

2018-05-21 Thread Moritz Wirth
Letsencrypt probably forwards port 80/port 11371 to 443, you can solve that if you add another server section for port 11371 (and port 80) where you handle the requests. Traffic on port 11371 should remain unencrypted so rewriting it to https is not allowed Sent from my iPhone > Am

Re: [Sks-devel] Implications of GDPR

2018-05-03 Thread Moritz Wirth
That does not help because you still Store european data which is still affected by the GDPR. What about only accepting valid keys and removing all revoked or expired keys from the database? If someone wants to have his data deleted he can revoke his key and the revoked signature is synced

Re: [Sks-devel] Implications of GDPR

2018-04-29 Thread Moritz Wirth
iPhone > Am 29.04.2018 um 17:08 schrieb robots.txt fan <robotsdot...@protonmail.com>: > > Moritz Wirth wrote: >> Given the fact that it is not possible to delete data from a keyserver > > Of course this is possible. You can delete key by using the "sks drop &q

Re: [Sks-devel] Implications of GDPR

2018-04-29 Thread Moritz Wirth
Hi Fabian, first of all, I am not a lawyer so you should not rely on my response as it may be wrong :) - The GDPR applies to all persons and companies who are located in the EU or offering goods, services or who monitor the behavior of EU data subjects - this means that all keyservers are

Re: [Sks-devel] dump-only server (gossip but not public pool availability)

2018-02-04 Thread Moritz Wirth
Hi, I am not completely sure how new keyservers are determined, one way seems to be the peering list. If you advertise the same hostname on multiple keyservers, only one node will be included (see keys1.flanga.io and keys2.flanga.io are both included in peering lists but only keys.flanga.io as

Re: [Sks-devel] Fwd: Re: Unde(r)served HKPS [was: Underserved areas?]

2018-01-14 Thread Moritz Wirth
Certificate Revocation is broken in most browsers today so there is no reliable way to revoke a certificate (especially if you do not use OCSP).  I don't think that it would be a big problem to get trusted certificates for HKPS, however the trust problem stays the same and it comes with other

Re: [Sks-devel] Unde(r)served HKPS [was: Underserved areas?]

2018-01-11 Thread Moritz Wirth
I requested a certificate a few days ago, however only well known keyservers receive a cert for HKPS (which is reasonable because the certificates are valid for a year and there is no reliable way for certificate revocation). Another idea around the mitm problem - the client retrieves the current

Re: [Sks-devel] Inclusion in membership file to peer

2018-01-09 Thread Moritz Wirth
Hi, the pgp keyserver dump is outdated for about 100k keys - i created a new dump which you can use: https://cdn.fstatic.io/sksdump My peering lines: keys.flanga.io 11370 # Flanga SKS Peering Administrator 0xd015c49b2eceb8f1 keys2.flanga.io 11370 # Flanga SKS Peering

Re: [Sks-devel] seeking peers for keyserver.iseclib.ru

2018-01-03 Thread Moritz Wirth
Hi, your keydump is behind the lower bound of keys for about 92.000 keys, you should probably use a different dump from another source. Best regards, Moritz Am 03.01.18 um 14:35 schrieb Теплов М.Ю.: > Hi, > > I am looking for peers for a new SKS keyserver installation. > > I am running SKS

Re: [Sks-devel] Cleanup SKS Logs

2017-12-08 Thread Moritz Wirth
Fabian A. Santiago: > December 6, 2017 2:59 PM, "Kristian Fiskerstrand" > <kristian.fiskerstr...@sumptuouscapital.com> > wrote: > >> On 12/06/2017 08:10 PM, Moritz Wirth wrote: >> >>> Can we delete the logfiles in the KDB/ directory (log.xxx

[Sks-devel] Cleanup SKS Logs

2017-12-06 Thread Moritz Wirth
Hello everybody, keys.flanga.io started running out of space and I want to cleanup some space. The database has been used for a year and is around 38 GB big now - compared:  the db size on keys2.flanga.io is about 28 GB and 21 GB on keys3.flanga.io Can we delete the logfiles in the KDB/

Re: [Sks-devel] Looking for peers

2017-08-26 Thread Moritz Wirth
Some recommendations: - You must run a reverse proxy in front of your sks instance to be included in the pool. - The server contact should only be a PGP KeyId without your email-address (though I dont know if it can be included there). - A simple key lookup on your server fails ( Error handling

[Sks-devel] seeking peers for keys.flanga.io, keys2.flanga.io

2017-07-20 Thread Moritz Wirth
keyserver. Peering line: keys2.flanga.io 11370 # Moritz Wirth <m...@flanga.io> 0x4733BFB2C7AC4938 I am also looking for new peers with my first keyserver: keys.flanga.io 11370 # Moritz Wirth <m...@flanga.io> 0x4733BFB2C7AC4938 For operational issues please contact me directly.

[Sks-devel] SKS Loadbalancing over DNS

2017-07-15 Thread Moritz Wirth
Good morning everybody, is it possible to loadbalance SKS/Nginx using multiple A records for the hostname? e.g. keys.flanga.io.0 INA1.2.3.4 keys.flanga.io.0 INA2.3.4.5 Best regards, Moritz signature.asc Description: OpenPGP digital signature

[Sks-devel] keyserver.corenetworking.de moves to a new domain

2017-03-04 Thread Moritz Wirth
Good evening all, due to internal changes, keyserver.corenetworking.de will move to keys.flanga.io. The new domain is already up and running, please adapt your membership files to the new line: keys.flanga.io 11370 # Moritz Wirth <m...@flanga.io> 0x4733BFB2C7AC4938 IPv4 and IPv6 Adress

Re: [Sks-devel] Unreachable status (still) for pgp.key-server.io

2016-11-05 Thread Moritz Wirth
Hello, Looks like your Sks-recon is not available on Port 11370 - Port 11370 is closed for a reason. The second thing I noticed is that your web interface can't access your Keyserver - searching for a key is also not possible. Best Regards, Moritz Am 05.11.16 um 03:11 schrieb Carles

Re: [Sks-devel] keyserver.corenetworking not shown as loadbalanced

2016-09-05 Thread Moritz Wirth
/05/2016 09:52 PM, Danny Horne wrote: >> On 05/09/2016 11:49 am, Moritz Wirth wrote: >>> Furthermore, I started using Snort, but i think it blocks the spider for >>> the pool status. Is there an IP-Address which I can whitelist? >> I think you'd also have to whitelist t

[Sks-devel] keyserver.corenetworking not shown as loadbalanced

2016-09-05 Thread Moritz Wirth
Hello, keyserver.corenetworking.de moved to a new datacenter last night and I decided to create a second instance for loadbalancing. All requests (on 80,443,11371) are handled by my nginx-cluster (corosync), loadbalancing works fine, but my server isn't shown as loadbalanced on sks-status page.

[Sks-devel] Looking for peers for keyserver.corenetworking.de

2016-02-19 Thread Moritz Wirth
on IPv4, IPv6 will be available later. We've loaded a keydump from 2016-02-18. We have 4190621 Keys loaded. If you have any questions, please do not hesitate to contact us. keyserver.corenetworking.de:11371 Thank you, Moritz Wirth PGP:0x44b1cafa8700570 -BEGIN PGP SIGNATURE- Comment