Re: [Sks-devel] Status page problem

2019-08-23 Thread Kristian Fiskerstrand
On 23.08.2019 06:13, Kiss Gabor (Bitman) wrote:
> Dear Kristian,
> 
> This screenshot was created this morning. (Cca. 04:00 UTC)
> http://bakacsin.ki.iif.hu/~kissg/tmp/sks-pool_screenshot.png

Thanks for reporting, that's curious...
> 
> Regards
> 
> Gabor
> 


-- 

Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk

Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3

Corruptissima re publica plurimæ leges
The greater the degeneration of the republic, the more of its laws



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-20 Thread Robert J. Hansen
 You've seemingly overlooked that the message was typed on a cell and
 the autocorrect isn't designed for English. 'This message was sent from
 my Android phone via K-9 Mail.' And because you instantly become
 personal in your first post and aren't engaging with the real issues,
 you're dead as a conversational partner to me.

Ah, thank you for the correction!  :)

With respect to the German language -- I spent a good bit of my 18th and
19th years in Saxony, and it literally changed my life.  I found Germany
to be a warm and welcoming place, and the vast majority of your
countrymen were kind to me.  I haven't been back since, although I'd
like to.

And what the hell.  This list has had enough drama and bad feelings as
of late, so I'll share a funny story from Hildesheim.

---

I was on a bus with my host sister, who had a major English test the
next day.  She asked if we could speak English so that she could get
some practice in before the Prüfung, so there we were chatting away.
Sitting across from us was a mother with her young daughter, and the
girl's eyes were wide as saucers as she watched me.

She tugged on her mother's sleeve and whispered to her, Mutti, Mutti!
Ein Ausländer!  Hier!  Er ist Ausländer!

For non-German speakers, that's a pretty rude thing to say.  Mom, Mom!
 A foreigner!  Here!  He's a foreigner!  My host sister and I gave her
a quizzical we're right here and we can hear you look, her mother made
fulsome apologies, and tried to hush her daughter.

The daughter just repeated it, louder, so everyone on the bus could
hear.  The mother looked as if she was about to die of embarrassment.

Finally I spoke to the little girl directly.  Ich bin nicht 'ein
Ausländer,' I said, scare-quoting the phrase with my fingers.  Ich bin
Amerikaner, ein Exchangestudent, und ein Freund zu meiner Freundin.

My host sister elbowed me suddenly and I knew I'd committed some gaffe,
but I went on anyway.

Ich bin Robert.  Was ist deine Name?  Wer ist deine Mutti?

The little girl looked as if I'd just slapped her.  She turned away,
stuck her nose high in the air, and said in an imperious voice --
/That's/ all right.  /I/ speak /English/.  She looked like a little
queen, really, and her accent was straight-up Alistair Cooke.

The entire bus broke out laughing.  After the laughter subsided I asked
my host sister what was wrong.  Nothing, she said irritatedly.  You
just kind of implied we're dating.  I'm your Freundin?

I blinked.  What?  It's the feminine of Freund...

Yes, and it's used for girlfriends.

So what's used for friends who happen to be women?

Freundin, of course.

I shook my head.  But it's the /same word!/

She shrugged.  It's more about how you say it, I guess.

I stared at her a moment.  Your language makes absolutely no sense, you
know that?

She gave me a glower and a smile.  This, from the English-speaker.

The bus had a second round of laughter over that.  :)

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-20 Thread Tobias Frei
Hi Robert,

I love that story; saved it in my Documents folder! :D

When one of my female friends refers to me or another male friend, they
usually use Kumpel (buddy) as workaround term for this problem.
Another possibility is:
Das ist ein Freund von mir (that's a friend of mine)
The ein (a / one) in this example sentence implies that it won't be a
boyfriend (because that usually wouldn't be one of many other boyfriends).

For female friends, I have no equivalent to Kumpel which I could use
as replacement. Instead, I either try to use the female version of the
example sentence above:
Das ist eine Freundin von mir (that's a [female] friend of mine)
...or, if that is applicable, I use gute Freundin (good [female]
friend), which also implies that I'm not referring to a girlfriend. :)


Best regards,
Tobias Frei


Am 20.04.2014 17:43, schrieb Robert J. Hansen:
 You've seemingly overlooked that the message was typed on a cell and
 the autocorrect isn't designed for English. 'This message was sent from
 my Android phone via K-9 Mail.' And because you instantly become
 personal in your first post and aren't engaging with the real issues,
 you're dead as a conversational partner to me.
 
 Ah, thank you for the correction!  :)
 
 With respect to the German language -- I spent a good bit of my 18th and
 19th years in Saxony, and it literally changed my life.  I found Germany
 to be a warm and welcoming place, and the vast majority of your
 countrymen were kind to me.  I haven't been back since, although I'd
 like to.
 
 And what the hell.  This list has had enough drama and bad feelings as
 of late, so I'll share a funny story from Hildesheim.
 
 ---
 
 I was on a bus with my host sister, who had a major English test the
 next day.  She asked if we could speak English so that she could get
 some practice in before the Prüfung, so there we were chatting away.
 Sitting across from us was a mother with her young daughter, and the
 girl's eyes were wide as saucers as she watched me.
 
 She tugged on her mother's sleeve and whispered to her, Mutti, Mutti!
 Ein Ausländer!  Hier!  Er ist Ausländer!
 
 For non-German speakers, that's a pretty rude thing to say.  Mom, Mom!
  A foreigner!  Here!  He's a foreigner!  My host sister and I gave her
 a quizzical we're right here and we can hear you look, her mother made
 fulsome apologies, and tried to hush her daughter.
 
 The daughter just repeated it, louder, so everyone on the bus could
 hear.  The mother looked as if she was about to die of embarrassment.
 
 Finally I spoke to the little girl directly.  Ich bin nicht 'ein
 Ausländer,' I said, scare-quoting the phrase with my fingers.  Ich bin
 Amerikaner, ein Exchangestudent, und ein Freund zu meiner Freundin.
 
 My host sister elbowed me suddenly and I knew I'd committed some gaffe,
 but I went on anyway.
 
 Ich bin Robert.  Was ist deine Name?  Wer ist deine Mutti?
 
 The little girl looked as if I'd just slapped her.  She turned away,
 stuck her nose high in the air, and said in an imperious voice --
 /That's/ all right.  /I/ speak /English/.  She looked like a little
 queen, really, and her accent was straight-up Alistair Cooke.
 
 The entire bus broke out laughing.  After the laughter subsided I asked
 my host sister what was wrong.  Nothing, she said irritatedly.  You
 just kind of implied we're dating.  I'm your Freundin?
 
 I blinked.  What?  It's the feminine of Freund...
 
 Yes, and it's used for girlfriends.
 
 So what's used for friends who happen to be women?
 
 Freundin, of course.
 
 I shook my head.  But it's the /same word!/
 
 She shrugged.  It's more about how you say it, I guess.
 
 I stared at her a moment.  Your language makes absolutely no sense, you
 know that?
 
 She gave me a glower and a smile.  This, from the English-speaker.
 
 The bus had a second round of laughter over that.  :)
 
 ___
 Sks-devel mailing list
 Sks-devel@nongnu.org
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 



smime.p7s
Description: S/MIME Cryptographic Signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-20 Thread Christian Reiß
It's a facepalm.
https://www.youtube.com/watch?feature=player_detailpagev=wjLgekyOZA0#t=57

(I did the facepalm several times over the course of this convsersation.)

-Christian.

On 20/04/14 19:51, Frank Villaro-Dixon wrote:
 Excuse my ignorance, but i'm curious to know what this smiley means, if
 someone could enlighten me ? ;)
 
 Thanks
 
 Frank
 

-- 

 Christian Reiss - em...@christian-reiss.de   /\  ASCII Ribbon
  \ /Campaign
 GPG Key: http://gpg.christian-reiss.deX   against HTML
 Jabber : ch...@alpha-labs.net/ \   in eMails

 It's better to reign in hell than to serve in heaven.,
John Milton, Paradise lost.



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-20 Thread Frank Villaro-Dixon

On 14-04-20 20:22:53, Christian Reiß, wrote 2.5K characters saying:

It's a facepalm.
(I did the facepalm several times over the course of this convsersation.)

I think I'll take that the good way :P




On 20/04/14 19:51, Frank Villaro-Dixon wrote:

Excuse my ignorance, but i'm curious to know what this smiley means, if
someone could enlighten me ? ;)

Thanks

Frank












--
/!\ En transition sur dvorak, excusez la brievete ;)
frank.villaro-dixon.eu   - PGP: 6F36914A
Envie d'électricité 100% verte ? Enercoop.fr
What is a Velomobile ?   www.sans-essence.eu

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-19 Thread Kiss Gabor (Bitman)
  *PLONK*
 
 Could someone please do me a kindness [...]

Phil,

Have you ever seen this lovely sign? :-)
http://upload.wikimedia.org/wikipedia/commons/1/19/Trolls.jpg

Gabor

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-19 Thread Tobias Frei
Hi,

okay, I hope I don't need to explain why this e-mail caused me to remove
you, Simon Lange, from my peering list.

It makes me sad to see such childish behavior on a mailing list like
this one.

btw, ur english doesnt make u look more kewl. c y?


Best regards,
Tobias Frei


Am 19.04.2014 02:21, schrieb Simon Lange:
 
 Am 18.04.2014 23:16, schrieb Phil Pennock:
 On 2014-04-18 at 20:24 +0200, Simon Lange wrote:
the reason why a reverse proxy is required is, because some
 require additional security at the nodes.
 
 False.
 ehm. nope. thats is what ive been told when i asked y the reverse proxy. ;)
 but good to know. :=)
 
yesterday i learned i
 have to give up control who is using his domain with my services. :/
 
 False.  As long as you can find people who will peer with you, you do
 not need to be in any pools at all.
 
 thats not the topic. and its rude btw.
 
 
 currently for :80 i do accept all for ^(.*)pool.sks-keyservers.net and
 
 Note that Kristian's pool is considered well-run and is used as the
 target of CNAMEs by other people.  Most notably, `keys.gnupg.net` is a
 CNAME to `pool.sks-keyservers.net`.
 
 So if you only whitelist for a pattern which, when unbroken, is:
 
  ^(?:.+\.)?pool\.sks-keyservers\.net
 
 then you've broken access by people using the default configuration of
 GnuPG.  Kristian doesn't want those people to experience a broken
 service, so you don't get listed.
 
 and that is written where exactly? see? thats why i req techdoc?!
 but keys.gnupg.net is already covered too. ;)
 
 
 Kristian _could_ decide to only support certain CNAMEs, then
 exhaustively test for all of those working, then going through the
 song-and-dance of de-listing most sites when he adds one more CNAME.
 Instead, he just says to be listed in my pools, then on port 11371, all
 HTTP requests under `/pks/` should be passed to SKS, no matter what is
 in the Host: header.  This creates less stress, less bureaucracy, less
 of a culture of having to ask permission for every action.
 
 allowing ALL is not a really good option. i already explained y. and a
 page with techdoc which hostnames should be allowed is not much.
 y using less procedure for pool reg than for gossip? whats the point
 with this? because less bureaucracy? less stress?
 i dont think its much stress and bureaucracy to tell ppl what hostnames
 should be able to use the service.
 
 
 domains using our services. its a matter of respect AND security. its an
 optin feature not a optout.
 
 Absolutely: you don't need to be listed in a pool, there is no hard
 requirement for it.
 
 right and you dont need to learn anything anymore since u know
 everything. oh wait. ;)
 try being less rude and try please to follow arguments.
 
 
 _I_ won't give away _my_ bandwidth for free to provide others with keys
 if they're not giving back to the community by being listed in public
 pools.  That's my choice, in not subsidising other peoples' businesses
 and hobbies from my own pocket more than I already do with my time on
 open source projects.
 
 that just proved that you didnt understand anything i wrote. this is not
 against good ppl. you dont protect your servers and your environment
 against good ppl. you protect it against bad ppl. so hard to
 understand?!
 and exactly THATS WHY i dont allow fqdn like keys.npd.de to use my
 keyserver. i dont support racist or inhuman parties/organizations. if
 you dont care for your community. okay. but for ppl who do care, its a
 maybe a problem to allow those ppl to advertise with services which are
 not run by them.
 
 all others are invited. gimme a short notice and i put them on. thats
 the concept of optin. this is how you configure firewalls too. deny all
 and tell whats allowed. in this case easy to do. thats why i really dont
 unerstand ur attitude.
 
 
 
 That's okay.  You and I don't have to peer.  There is no one right way,
 
 nobody talks about peering. m)
 
 no authority saying everyone must peer, no right to peering, no
 expectation that everyone agree.
 
 m)
 
 
 You can probably find other people who will peer with you.
 
 you dont get it. the topic is NOT peering. m)
 
 
 (11371). there is absolutely no reason for a via (which may exposes the
 used software)
 
 You don't need to expose full version, but revealing Apache/2 provides
 enough for most debugging.  If revealing even that much makes you
 vulnerable, then you have bigger problems, because more intrusive
 platform fingerprinting by those of malicious intent will identify your
 platform anyway.
 
 you are derailing the topic.
 
 
 FQDNs to use that specifiy service. dont allow anyone except fqdn which
 did ask before is far more secure. (e.g. i dont want any raccist website
 to advertise with MY services under THEIR domain, but because i cannot
 KNOW all such domains, its better to deny all and allow a few).
 
 Go ahead, use that policy.  Find others who agree, create pool
 definitions 

Re: [Sks-devel] status page

2014-04-19 Thread Simon Lange
Agree. Ppl get personal swearing against me but dont had the kindness to read 
the post and try to understand it. 
All i did critizize was the lack of proper techdoc and that informationflow is 
waterdrop by waterdrop. Not a reason to insult me.

If you give a fuck for poolmember's feedback then say it. Would save time to 
write ignored arguments again and again.

And tobias if u put ur emotions above your prpfessionality its ok for me. Hust 
bame it. Wonder y emotional insulters may have admin privs at a public paid 
university. Your biz not mine. Just wondering.

Remove ur peering if u insist although THAT Would be rly childish. So sleep 
over and call for it or not. Maybe this time without insulting me.

m(
Simon


On 19. April 2014 13:03:12 MESZ, Tobias Frei tob...@freiwuppertal.de wrote:
It makes me sad to see such childish behavior on a mailing list like
this one.

-- 
Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet.
-- 
Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet.___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-19 Thread Arnold
Hi list,

Trying to be a bit more on-topic again...

On 04/18/2014 10:42 PM, Simon Lange wrote:
 Am 18.04.2014 22:10, schrieb Martin Papik:
 Answering ALL host names just makes you willing to participate in any
 pool by default, without extra maintenance. But again, AFAIK this
 isn't a requirement. Am I misinformed?
 
 https://twitter.com/krifisk/status/456717051340791808
 With a HTTP Host header not belonging to the specific hostname? Note
 the -H 'Host.' , 11371 should allow ALL traffic through

I figured this is because of the following.

HTTP is a unique protocol in that it allows the client to provide the hostname 
of
the host it is communicating to (basically it is a selection parameter a client 
can
provide, regardless of the hostname it resolved, for servers hosting several
websites). Other protocols, like SMTP, NTP, etc. just listen at a given IP/port
that the client 'somehow' manages to obtain. THAT is how most of the internet 
works.

I have not looked into it but I am not even sure HTTP requires the 'HOST' header
field to be present in requests. AFAIK it was not sent in the early days.

The key exchange protocol HKP is not an RFC standard. AFAIK it is best 
specified in
http://tools.ietf.org/html/draft-shaw-openpgp-hkp-00
It does not mention the 'HOST' field, so I guess openGPG implementations using 
HKP
are not required to provide a (valid) HOST. Note that HKP is a protocol by 
itself
(P in HKP), just reusing some of HTTP.

People implementing HKP for small devices (Android, iOS, embedded systems, etc.)
may omit sending the HOST, although they may be using our pool domain.

Therefore, we (people in the pool) can make no assumptions on the value of the
'HOST' parameter. Therefore, it is good practice (if being part of the pool) to
respond to all clients connecting to port 11371.
And therefore, I don't provide the HKP-service at port 80 over IPv4. My choice 
:-)


 How would bad people benefit from your key-server responding to
 http://very.bad.com:11731/ anyway?
 
 bad ppl could pretend offering a public service using my machines they
 dont own nor they administre nor they run. my machines would support
 that passivly. think this is easy to understand. and also has some legal
 implications.

No, although it might give you trouble explaining to legal people how DNS and 
the
internet works... It is just not in your hands what IP's other people put in 
their
DNS. People who associate you with the owners of 'unwanted domain' simply don't
understand the internet.

I understand there might be situations that can make you feel uncomfortable,
especially when serving a website. However, among the millions of keys we 
serve, I
am sure there are keys of people that I don't want to be associated with.
Therefore, I try to be associated with 'undiscriminating' key server 
administrators
and hope this outweighs possible negative associations :-)

To me, it is even better if Mr(s) Bad points his/her own domain/DNS to my key
server to get his/her key, than prominently being listed with my own domain 
name on
the website of Mr(s) Bad. That would even result in a google-association...


Off-topic
As a side note: curious how easily some discussions on this list go into 
extremes,
followed by getting personal and people getting hurt. Usually that kind of 
emotions
is a sign of dedication to the subject, making it even more painful...

As I am open to every client connecting (though rate limited), I am also open 
for
peering with every SKS operator. Just send me your info off-list and I'll send 
you
mine.

Just my € 0,02

Arnold

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-19 Thread Simon Lange
Agree. Ppl get personal swearing against me but dont had the kindness to read 
the post and try to understand it. 
All i did critizize was the lack of proper techdoc and that informationflow is 
waterdrop by waterdrop. Not a reason to insult me.

If you give a fuck for poolmember's feedback then say it. Would save time to 
write ignored arguments again and again.

And tobias if u put ur emotions above your prpfessionality its ok for me. Hust 
bame it. Wonder y emotional insulters may have admin privs at a public paid 
university. Your biz not mine. Just wondering.

Remove ur peering if u insist although THAT Would be rly childish. So sleep 
over and call for it or not. Maybe this time without insulting me.

m(
Simon


On 19. April 2014 13:03:12 MESZ, Tobias Frei tob...@freiwuppertal.de wrote:
It makes me sad to see such childish behavior on a mailing list like
this one.

-- 
Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet.

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-19 Thread Robert J. Hansen
 Agree. Ppl get personal swearing against me but dont had the kindness
 to read the post and try to understand it.

I have read all the posts in this thread and done my best to understand
them.  Some things I can't decipher, like

 Hust bame it.

... which is, IMO, a case study in why standard English (of either the
US or UK varieties) should be used on this list when possible.  This is
not a personal attack, Simon: it's simply telling you that your
preferred method of writing is unclear and difficult to understand.

Further: I would remind to all parties that courtesy and respect are
important to the functioning of the keyserver community.  Comments such as

 If you give a fuck for poolmember's feedback then say it. Would save 
 time to write ignored arguments again and again.

or

 And tobias if u put ur emotions above your prpfessionality its ok
 for me. Hust bame it. Wonder y emotional insulters may have admin
 privs at a public paid university.

are ultimately damaging to the community, and will likely result in the
breaking of peering agreements.

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Tobias Frei
Hi,

maybe you need to send a correct Via: header to allow automatic
detection of the reverse proxy. If proxying is done completely
transparent, there is probably no way to see that there is actually a
proxy in front of sks. That's what I would assume, at least.


Best regards,
Tobias Frei


Am 17.04.2014 16:20, schrieb Simon Lange (BIT):
 well, but there IS a reverse proxy. ;)
 
 tcp0  0 78.46.21.218:11371  0.0.0.0:*  
 LISTEN  8804/lighttpd
 tcp0  0 127.0.0.1:11371 0.0.0.0:*  
 LISTEN  10018/sks
 tcp6   0  0 2a01:4f8:201:22e3:11371 :::*   
 LISTEN  8804/lighttpd
 
 
 Am 2014-04-17 15:56, schrieb Tobias Frei:
 Hi,

 from the status page you've linked:

 Latest status: Not OK
 Reason: Not running a reverse proxy


 Best regards,
 Tobias Frei

 Am 17.04.2014 01:13, schrieb Simon Lange:
 Hi,

 im a it supprised. i just stumbled over:
 https://sks-keyservers.net/status/info/keys.s-l-c.biz

 which says that my keyserver was last seen three days ago. im not
 enlisted anymore and the status page cannot even say what server
 im running etc etc

 im a bit wondered. why? i can reach it via 11370 11371 and 443

 proof? simon@entertain:~$ gpg --keyserver hkp://keys.s-l-c.biz
 --search-key m...@simonlange.eu gpg: searching for
 m...@simonlange.eu from hkp server keys.s-l-c.biz (1) Simon
 Lange m...@simonlange.eu 2048 bit RSA key BDD503BE, created:
 2009-09-04 Keys 1-1 of 1 for m...@simonlange.eu.  Enter
 number(s), N)ext, or Q)uit 

 works like charme.

 via browser? see attachment (screenshot). works too. ;)

 recon works too 2014-04-17 01:12:04 Beginning recon as server,
 client: ADDR_INET [162.243.102.241]:59001 2014-04-17 01:12:04
 Joining reconciliation 2014-04-17 01:12:04 Reconciliation complete
 2014-04-17 01:12:04 2 hashes recovered from ADDR_INET
 [162.243.102.241]:11371 2014-04-17 01:12:04
 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:04
 1177F736C69004B45FA475ACB149F894 2014-04-17 01:12:04 Disabling
 gossip 2014-04-17 01:12:14 Requesting 2 missing keys from
 ADDR_INET [162.243.102.241]:11371, starting with
 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:14 2 keys
 received


 so why is my server not enlisted anymore? what are the exactly port
 protocols you are checking?!

 id like to prevent such a status page although keyserver is still
 up n running. oO

 thanks for your help

 Simon




 ___ Sks-devel mailing
 list Sks-devel@nongnu.org
 https://lists.nongnu.org/mailman/listinfo/sks-devel



 ___
 Sks-devel mailing list
 Sks-devel@nongnu.org
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 



smime.p7s
Description: S/MIME Cryptographic Signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Tobias Frei
Er, sorry, I see you already do that. Then maybe the automatic
detection failed for whatever reason.

And I just noticed that your status changed to OK. Weird^^


Best regards,
Tobias Frei

Am 18.04.2014 13:30, schrieb Tobias Frei:
 Hi,
 
 maybe you need to send a correct Via: header to allow automatic 
 detection of the reverse proxy. If proxying is done completely 
 transparent, there is probably no way to see that there is actually
 a proxy in front of sks. That's what I would assume, at least.
 
 
 Best regards, Tobias Frei
 
 
 Am 17.04.2014 16:20, schrieb Simon Lange (BIT):
 well, but there IS a reverse proxy. ;)
 
 tcp0  0 78.46.21.218:11371  0.0.0.0:*
  LISTEN  8804/lighttpd tcp0  0 127.0.0.1:11371
 0.0.0.0:* LISTEN  10018/sks tcp6   0  0
 2a01:4f8:201:22e3:11371 :::* LISTEN  8804/lighttpd
 
 
 Am 2014-04-17 15:56, schrieb Tobias Frei:
 Hi,
 
 from the status page you've linked:
 
 Latest status: Not OK Reason: Not running a reverse proxy
 
 
 Best regards, Tobias Frei
 
 Am 17.04.2014 01:13, schrieb Simon Lange:
 Hi,
 
 im a it supprised. i just stumbled over: 
 https://sks-keyservers.net/status/info/keys.s-l-c.biz
 
 which says that my keyserver was last seen three days ago. im
 not enlisted anymore and the status page cannot even say what
 server im running etc etc
 
 im a bit wondered. why? i can reach it via 11370 11371 and
 443
 
 proof? simon@entertain:~$ gpg --keyserver
 hkp://keys.s-l-c.biz --search-key m...@simonlange.eu gpg:
 searching for m...@simonlange.eu from hkp server
 keys.s-l-c.biz (1) Simon Lange m...@simonlange.eu 2048
 bit RSA key BDD503BE, created: 2009-09-04 Keys 1-1 of 1 for
 m...@simonlange.eu.  Enter number(s), N)ext, or Q)uit 
 
 works like charme.
 
 via browser? see attachment (screenshot). works too. ;)
 
 recon works too 2014-04-17 01:12:04 Beginning recon as
 server, client: ADDR_INET [162.243.102.241]:59001
 2014-04-17 01:12:04 Joining reconciliation 2014-04-17
 01:12:04 Reconciliation complete 2014-04-17 01:12:04 2 hashes
 recovered from ADDR_INET [162.243.102.241]:11371 2014-04-17
 01:12:04 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17
 01:12:04 1177F736C69004B45FA475ACB149F894 2014-04-17 01:12:04
 Disabling gossip 2014-04-17 01:12:14 Requesting 2 missing
 keys from ADDR_INET [162.243.102.241]:11371, starting with 
 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:14 2 keys 
 received
 
 
 so why is my server not enlisted anymore? what are the
 exactly port protocols you are checking?!
 
 id like to prevent such a status page although keyserver is
 still up n running. oO
 
 thanks for your help
 
 Simon
 
 
 
 
 ___ Sks-devel
 mailing list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 
 
 
 ___ Sks-devel
 mailing list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 
 
 
 
 ___ Sks-devel mailing
 list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 



smime.p7s
Description: S/MIME Cryptographic Signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Arnold
Hi,

On 04/17/2014 04:20 PM, Simon Lange (BIT) wrote:
 well, but there IS a reverse proxy. ;)
 tcp0  0 78.46.21.218:11371  0.0.0.0:*   LISTEN
  
 8804/lighttpd

If I remember right, the monitor checks for a 'VIA' header. See
https://bitbucket.org/skskeyserver/sks-keyserver/wiki/Peering for the 
configuration
of several proxe servers.

Arnold


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Martin Papik
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


I don't know who maintains the monitor, but this email chain prompted
me to have a quick look at the differences between the responses
between a reverse proxy and SKS and I found a few differences and how
to detect a reverse proxy. I've come up with two other ways to detect
a reverse proxy (other than the Via header). Maybe the Via header is
important for some other part of the protocol I'm not aware of, i.e.
for the client to detect and report who actually handled the request,
but here goes.

Method 1, request HEAD for the status page
lynx -mime_header -head -source
'http://xxx:11371/pks/lookup?op=stats'
A reverse proxy responds with 502 proxy error and lynx returns with
no error (0), SKS cuts the connection without returning any headers
(which causes the proxy error), in which case lynx exits with error (1).

Method 2, intrusive, connect to port 11371, request status via a new
connection and see if it completes.

Method 2 is useless in practice, but method 1 might give additional
information. Maybe distinguish between a well configured reverse proxy
and a badly configured reverse proxy.

Martin

On 04/18/2014 02:30 PM, Tobias Frei wrote:
 Hi,
 
 maybe you need to send a correct Via: header to allow automatic 
 detection of the reverse proxy. If proxying is done completely 
 transparent, there is probably no way to see that there is actually
 a proxy in front of sks. That's what I would assume, at least.
 
 
 Best regards, Tobias Frei
 
 
 Am 17.04.2014 16:20, schrieb Simon Lange (BIT):
 well, but there IS a reverse proxy. ;)
 
 tcp0  0 78.46.21.218:11371  0.0.0.0:*
  LISTEN  8804/lighttpd tcp0  0 127.0.0.1:11371
 0.0.0.0:* LISTEN  10018/sks tcp6   0  0
 2a01:4f8:201:22e3:11371 :::* LISTEN  8804/lighttpd
 
 
 Am 2014-04-17 15:56, schrieb Tobias Frei:
 Hi,
 
 from the status page you've linked:
 
 Latest status: Not OK Reason: Not running a reverse proxy
 
 
 Best regards, Tobias Frei
 
 Am 17.04.2014 01:13, schrieb Simon Lange:
 Hi,
 
 im a it supprised. i just stumbled over: 
 https://sks-keyservers.net/status/info/keys.s-l-c.biz
 
 which says that my keyserver was last seen three days ago. im
 not enlisted anymore and the status page cannot even say what
 server im running etc etc
 
 im a bit wondered. why? i can reach it via 11370 11371 and
 443
 
 proof? simon@entertain:~$ gpg --keyserver
 hkp://keys.s-l-c.biz --search-key m...@simonlange.eu gpg:
 searching for m...@simonlange.eu from hkp server
 keys.s-l-c.biz (1) Simon Lange m...@simonlange.eu 2048
 bit RSA key BDD503BE, created: 2009-09-04 Keys 1-1 of 1 for
 m...@simonlange.eu.  Enter number(s), N)ext, or Q)uit 
 
 works like charme.
 
 via browser? see attachment (screenshot). works too. ;)
 
 recon works too 2014-04-17 01:12:04 Beginning recon as
 server, client: ADDR_INET [162.243.102.241]:59001
 2014-04-17 01:12:04 Joining reconciliation 2014-04-17
 01:12:04 Reconciliation complete 2014-04-17 01:12:04 2 hashes
 recovered from ADDR_INET [162.243.102.241]:11371 2014-04-17
 01:12:04 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17
 01:12:04 1177F736C69004B45FA475ACB149F894 2014-04-17 01:12:04
 Disabling gossip 2014-04-17 01:12:14 Requesting 2 missing
 keys from ADDR_INET [162.243.102.241]:11371, starting with 
 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:14 2 keys 
 received
 
 
 so why is my server not enlisted anymore? what are the
 exactly port protocols you are checking?!
 
 id like to prevent such a status page although keyserver is
 still up n running. oO
 
 thanks for your help
 
 Simon
 
 
 
 
 ___ Sks-devel
 mailing list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 
 
 
 ___ Sks-devel
 mailing list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 
 
 
 
 ___ Sks-devel mailing
 list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=A8Ol
-END PGP 

Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Hi,
after directly communicating with Kristian via twitter i could enlight
the whole situation.
first. the whole process lacks of rudementary technical documentation.

second. if the requirement is a reverse proxy and there is one, but your
script fails. then blame the script. otherwise declare exactly what you
want to check and what you expect to get. a transparent proxy is still a
proxy. the reason why a reverse proxy is required is, because some
require additional security at the nodes. useless to tell, that its
not their biz nor their construction site. anyhow, in my case i did
provide a reverse proxy, which is listening exactly to that hostname i
did provide too as gossip on this mailing list. ;) yesterday i learned i
have to give up control who is using his domain with my services. :/

currently for :80 i do accept all for ^(.*)pool.sks-keyservers.net and
if kristian or someone else wants to join the server for their pool to
id recommend the same kindness as for gossip. tell them explicitly that
you want to use their service so give them the chance to add their
domain too not requiring allowing the whole world to user their all
domains using our services. its a matter of respect AND security. its an
optin feature not a optout. this is the same for the reverseproxy
(11371). there is absolutely no reason for a via (which may exposes the
used software) or a global allow to the whole world to use all existing
FQDNs to use that specifiy service. dont allow anyone except fqdn which
did ask before is far more secure. (e.g. i dont want any raccist website
to advertise with MY services under THEIR domain, but because i cannot
KNOW all such domains, its better to deny all and allow a few).

third. never mix technical documentation with ANY advertisement/pr texts
just telling how cool how nice how fast how whatssoever the service is.
an admin wants techdoc not PR. ;)

this is not a rant, but maybe sounds rude to some. hope i could explain
what my point is. i like techdoc which explains the WHOLE process. i
hate not having techdoc or incomplete techdoc and getting information
waterdrop-wise. thats all.

best regards

Simon
PS: as the status page says its working now. if you want to put my
tcp/11371 tcp/80 on your proxy/lb, tell me the fqdn you may use. i put
them in. yes, i will disable the allow all setting in the next couple of
days again.



Am 18.04.2014 19:50, schrieb Martin Papik:

 I don't know who maintains the monitor, but this email chain prompted
 me to have a quick look at the differences between the responses
 between a reverse proxy and SKS and I found a few differences and how
 to detect a reverse proxy. I've come up with two other ways to detect
 a reverse proxy (other than the Via header). Maybe the Via header is
 important for some other part of the protocol I'm not aware of, i.e.
 for the client to detect and report who actually handled the request,
 but here goes.

 Method 1, request HEAD for the status page
 lynx -mime_header -head -source
 'http://xxx:11371/pks/lookup?op=stats'
 A reverse proxy responds with 502 proxy error and lynx returns with
 no error (0), SKS cuts the connection without returning any headers
 (which causes the proxy error), in which case lynx exits with error (1).

 Method 2, intrusive, connect to port 11371, request status via a new
 connection and see if it completes.

 Method 2 is useless in practice, but method 1 might give additional
 information. Maybe distinguish between a well configured reverse proxy
 and a badly configured reverse proxy.

 Martin

 On 04/18/2014 02:30 PM, Tobias Frei wrote:
  Hi,

  maybe you need to send a correct Via: header to allow automatic
  detection of the reverse proxy. If proxying is done completely
  transparent, there is probably no way to see that there is actually
  a proxy in front of sks. That's what I would assume, at least.


  Best regards, Tobias Frei


  Am 17.04.2014 16:20, schrieb Simon Lange (BIT):
  well, but there IS a reverse proxy. ;)
 
  tcp0  0 78.46.21.218:11371  0.0.0.0:*
   LISTEN  8804/lighttpd tcp0  0 127.0.0.1:11371
  0.0.0.0:* LISTEN  10018/sks tcp6   0  0
  2a01:4f8:201:22e3:11371 :::* LISTEN  8804/lighttpd
 
 
  Am 2014-04-17 15:56, schrieb Tobias Frei:
  Hi,
 
  from the status page you've linked:
 
  Latest status: Not OK Reason: Not running a reverse proxy
 
 
  Best regards, Tobias Frei
 
  Am 17.04.2014 01:13, schrieb Simon Lange:
  Hi,
 
  im a it supprised. i just stumbled over:
  https://sks-keyservers.net/status/info/keys.s-l-c.biz
 
  which says that my keyserver was last seen three days ago. im
  not enlisted anymore and the status page cannot even say what
  server im running etc etc
 
  im a bit wondered. why? i can reach it via 11370 11371 and
  443
 
  proof? simon@entertain:~$ gpg --keyserver
  hkp://keys.s-l-c.biz --search-key m...@simonlange.eu gpg:
  searching for 

Re: [Sks-devel] status page

2014-04-18 Thread Martin Papik
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 04/18/2014 09:24 PM, Simon Lange wrote:
 yesterday i learned i have to give up control who is using his
 domain with my services. :/

Please explain, I'm not aware of such a requirement and if there is
such I would like to know about it so I can make informed decisions.

Thank you

Martin
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=K+9K
-END PGP SIGNATURE-

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Am 18.04.2014 21:18, schrieb Martin Papik:
 On 04/18/2014 09:24 PM, Simon Lange wrote:
  yesterday i learned i have to give up control who is using his
  domain with my services. :/

 Please explain, I'm not aware of such a requirement and if there is
 such I would like to know about it so I can make informed decisions.

Ive been told that it is required to allow ALL incoming traffic to the
IP of my keyserver for port 11371 no matter what hostname is requested.
that would - of course - allow everyone on this planet to pinpoint his
FQDN to my server using my service.

usually i use hostname directives. e.g. keys.s-l-c.biz or keys.bundes.it
or (.*)pool.sks-keyservers.net
i prefer that because that way i can avoid that ppl use my services with
their fqdn i dont like (like raccists facists and other bad ppl).

i opened it temporaly so we are enlisted in the pool again. but in a
couple of days i close that door again allowing ONLY those fqdm who did
contact me before. so i got at least a minimum control who is using my
services with their fqdn and who not. ;)
in a couple of days the fqdn written above will work. others not.


 Thank you

 Martin

best regards

Simon

- -- 

Simon Lange Consulting  - Gaudystr. 6  - DE-10437 Berlin
Telefon: +49(0)30/89757206 Mobil: +49(0)151/22640160
- http://s-l-c.biz
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
 
iQEcBAEBAgAGBQJTUX7qAAoJELCfvQa91QO+bjEH/j+j1Y7EUXVNqkQrEi0QLOxt
6387q2q9LuC8c+Kpa4EgZJLB6Tpptedz31y+bq+hhN53qmoNy6a2mNV399MY0iDa
Sx5khJ7gd5713vJCNlGuiyfK4Hz4NdoHZPMyVKu/2B9p1Od4LHehukGNmCAAQDS5
LyNRMlqy9cMXz+YijLrL5gvZ597YML1fbA3aTottCfbm2AJGXiSBxYvZiL/apJvl
T24nDR60CndUEbsKp/O4IjZiBFQvZdVKjRxzik1ujx4ahUfcs1AFfWZrO6vORAlV
xVqWJJDAWns5Pdi/VmevWDS7H6HIo/onQ8ZuLHqqA7HRnQiTDdFPJgEzRi/QxMw=
=DV8h
-END PGP SIGNATURE-


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Martin Papik
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 04/18/2014 10:37 PM, Simon Lange wrote:
 Ive been told that it is required to allow ALL incoming traffic to
 the IP of my keyserver for port 11371 no matter what hostname is
 requested. that would - of course - allow everyone on this planet
 to pinpoint his FQDN to my server using my service.
 
 usually i use hostname directives. e.g. keys.s-l-c.biz or
 keys.bundes.it or (.*)pool.sks-keyservers.net i prefer that because
 that way i can avoid that ppl use my services with their fqdn i
 dont like (like raccists facists and other bad ppl).

You of course can (should?) limit the HTTP host names to whatever you
expect, but I've never heard of a requirement to answer ALL host
names. A response to the raw IP address would be probably good, but
are you really required to answer http://blablabla/ on tcp/11371? I've
never heard about such a requirement. Not beyond answering requests
for the pool host name if you wish to participate in a pool.

Answering ALL host names just makes you willing to participate in any
pool by default, without extra maintenance. But again, AFAIK this
isn't a requirement. Am I misinformed?

How would bad people benefit from your key-server responding to
http://very.bad.com:11731/ anyway?

AFAIK today the key server doesn't serve arbitrary pictures, when it
will this will be an issue, more because of spam I expect than on
account of nasty web sites.

Does lighthttpd (which you seem to be using) expose some kind of a
forward proxy?

Martin
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=Dc7u
-END PGP SIGNATURE-

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Tobias Frei
Hi,

sorry for my naivity, but I can't really think of a scenario where it
would be a problem that your PGP keyserver (and only that one,
keys.s-l-c.biz) is accessible under any other domain name.

If your keyserver is accessible at insert-racist-domain-name-here.tld,
so what? Does that make you a racist? Does that make the keyserver racist?

I personally don't really get that logic.


Best regards,
Tobias Frei

Am 18.04.2014 21:37, schrieb Simon Lange:

 i prefer that because that way i can avoid that ppl use my services with
 their fqdn i dont like (like raccists facists and other bad ppl).
 
 i opened it temporaly so we are enlisted in the pool again. but in a
 couple of days i close that door again allowing ONLY those fqdm who did
 contact me before. so i got at least a minimum control who is using my
 services with their fqdn and who not. ;)
 in a couple of days the fqdn written above will work. others not.



smime.p7s
Description: S/MIME Cryptographic Signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Am 18.04.2014 22:10, schrieb Martin Papik:
 Answering ALL host names just makes you willing to participate in any
 pool by default, without extra maintenance. But again, AFAIK this
 isn't a requirement. Am I misinformed?

https://twitter.com/krifisk/status/456717051340791808
With a HTTP Host header not belonging to the specific hostname? Note
the -H 'Host.' , 11371 should allow ALL traffic through


 How would bad people benefit from your key-server responding to
 http://very.bad.com:11731/ anyway?

bad ppl could pretend offering a public service using my machines they
dont own nor they administre nor they run. my machines would support
that passivly. think this is easy to understand. and also has some legal
implications. just imagine feds want to seize all machines of some bad
ppland pinpoint using the IPs the get from running services under
badppl's domains... not worth the risk while easy to avoid.
we dont gossip with everyone without handshaking first. i keep it that
way same with the pool. :)


 Does lighthttpd (which you seem to be using) expose some kind of a
 forward proxy?

only if i ask him to. ;) if i run him transparently the
pool-check-script fails and says that i dont run a reverse proxy. ;)


 Martin
Simon

- -- 

Simon Lange Consulting  - Gaudystr. 6  - DE-10437 Berlin
Telefon: +49(0)30/89757206 Mobil: +49(0)151/22640160
- http://s-l-c.biz
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
 
iQEcBAEBAgAGBQJTUY4/AAoJELCfvQa91QO+KyEH/iOzvCXkYlkAbyz8vZP4e6xm
eSI8wvt+F8KDh/zdgw8Dk5iw2cEMOqYrob/JwmrvSXML+mpipIbUE5r0zXNy25PB
kkxQOxbvkM6btJSQA+tkvRNJMlT/RDLuJySSGIMumUAcNQJVfqySWHaqxw2YhEol
daEDjfNzMxnxj+QCdDKf8zNtQUhqkcqSEdRRyhyZVtnmsOQopmngRZSNGVil8ipV
NCXc6Oo0X6ghwPXtgtkczK91/2Po5lfTfqsBXBVAH4XJvrE0JQnhGo5RL7/sZ0MY
ECZMPS6DEHwbo5hpqoqsINheCYpC6yiQyazCUwxURHvqdNwbt7XXGpePluEJIZM=
=1kAW
-END PGP SIGNATURE-


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange
im afraid gpg wont show that while using it. ;)
but for the webinterface its valid. ;)

but i see you understand now my problem. ;)

Simon

Am 18.04.2014 22:38, schrieb Tobias Frei:
 Hi,

 simply add this page is served by keys.s-l-c.biz; I am in no way
 affiliated with other hostnames which might resolve to this IP or
 something like that to the page then?



 Best regards,
 Tobias Frei

 Am 18.04.2014 22:31, schrieb Simon Lange:
 it gives those bad ppl a benefit. because they can pretend
 running a public service although they dont. and i would passivly
 support them with my machines doing that. thats a nogo for me.

 see?

 Simon

 Am 18.04.2014 22:26, schrieb Tobias Frei:
 Hi,

 sorry for my naivity, but I can't really think of a scenario
 where it would be a problem that your PGP keyserver (and only
 that one, keys.s-l-c.biz) is accessible under any other domain
 name.

 If your keyserver is accessible at
 insert-racist-domain-name-here.tld, so what? Does that make you a
 racist? Does that make the keyserver racist?

 I personally don't really get that logic.


 Best regards, Tobias Frei

 Am 18.04.2014 21:37, schrieb Simon Lange:

 i prefer that because that way i can avoid that ppl use my
 services with their fqdn i dont like (like raccists facists and
 other bad ppl).

 i opened it temporaly so we are enlisted in the pool again. but
 in a couple of days i close that door again allowing ONLY those
 fqdm who did contact me before. so i got at least a minimum
 control who is using my services with their fqdn and who not.
 ;) in a couple of days the fqdn written above will work. others
 not.

 ___ Sks-devel mailing
 list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel



-- 

Simon Lange Consulting  - Gaudystr. 6  - DE-10437 Berlin
Telefon: +49(0)30/89757206 Mobil: +49(0)151/22640160
http://s-l-c.biz


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Martin Papik
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 04/18/2014 11:42 PM, Simon Lange wrote:
 https://twitter.com/krifisk/status/456717051340791808 With a HTTP
 Host header not belonging to the specific hostname? Note the -H
 'Host.' , 11371 should allow ALL traffic through

Sounds more like a recommendation than a requirement. At least to me.
Maybe he'll chime in to clarify.

 How would bad people benefit from your key-server responding to 
 http://very.bad.com:11731/ anyway?
 
 bad ppl could pretend offering a public service using my machines
 they dont own nor they administre nor they run. my machines would
 support that passivly. think this is easy to understand. and also
 has some legal implications. just imagine feds want to seize all
 machines of some bad ppland pinpoint using the IPs the get from
 running services under badppl's domains... not worth the risk while
 easy to avoid. we dont gossip with everyone without handshaking
 first. i keep it that way same with the pool. :)

Feds aren't stupid. Your machines wouldn't support anything, and
they'd merely be more victims of criminals. Personally I don't see
this as an argument. Otherwise you could say that merely having a
public IP puts you at risk of having your servers seized because
anyone can point their domains at them. On the other hand if your
servers already contain something that might be interesting to the
feds, you might be in trouble and you should be cautious. If you're
worried, maybe you should contact the feds to find out what puts you
at risk of HW seizure. :-) After all, I'm not qualified to give you
legal advice. Merely expressing my personal opinion. Good luck.

Martin
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=VpKj
-END PGP SIGNATURE-

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Phil Pennock
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2014-04-18 at 20:24 +0200, Simon Lange wrote:
the reason why a reverse proxy is required is, because some
 require additional security at the nodes.

False.

The SKS software is single threaded and handles a single request at a
time.  One client can hold open a connection and prevent anyone else
from using your server.

Anyone can run a pool definition, using whatever criteria they like.
There is no requirement to be in any pool.  Equally, there is no
requirement for anyone else to peer with you.  If you can find people
willing to peer with you while you don't work to fit in any pools, then
that's okay -- nobody but you and your peers has any business telling
you what to do.  So far, mostly, keyserver operators have been willing
to add peers without checks for pool-worthiness because so far, mostly,
new community members have worked to be members of the main pools, so
there has been no need.

Kristian's pools list only keyservers which he thinks are suitable to be
listed as defaults for end-users.  The rules change over time as we
learn and develop; Kristian has always clearly communicated changes to
this mailing-list.

Amongst other things, his requirements include keyservers which won't
hang because some other client is holding open a connection, so that
the keyservers are not going to be seen as broken, never working,
leading end-users to disable PGP.  Other requirements include
up-to-date, able to peer reliably, not so buggy as to cause interop
problems, and more.

yesterday i learned i
 have to give up control who is using his domain with my services. :/

False.  As long as you can find people who will peer with you, you do
not need to be in any pools at all.

 currently for :80 i do accept all for ^(.*)pool.sks-keyservers.net and

Note that Kristian's pool is considered well-run and is used as the
target of CNAMEs by other people.  Most notably, `keys.gnupg.net` is a
CNAME to `pool.sks-keyservers.net`.

So if you only whitelist for a pattern which, when unbroken, is:

 ^(?:.+\.)?pool\.sks-keyservers\.net

then you've broken access by people using the default configuration of
GnuPG.  Kristian doesn't want those people to experience a broken
service, so you don't get listed.

Kristian _could_ decide to only support certain CNAMEs, then
exhaustively test for all of those working, then going through the
song-and-dance of de-listing most sites when he adds one more CNAME.
Instead, he just says to be listed in my pools, then on port 11371, all
HTTP requests under `/pks/` should be passed to SKS, no matter what is
in the Host: header.  This creates less stress, less bureaucracy, less
of a culture of having to ask permission for every action.

 domains using our services. its a matter of respect AND security. its an
 optin feature not a optout.

Absolutely: you don't need to be listed in a pool, there is no hard
requirement for it.

_I_ won't give away _my_ bandwidth for free to provide others with keys
if they're not giving back to the community by being listed in public
pools.  That's my choice, in not subsidising other peoples' businesses
and hobbies from my own pocket more than I already do with my time on
open source projects.

That's okay.  You and I don't have to peer.  There is no one right way,
no authority saying everyone must peer, no right to peering, no
expectation that everyone agree.

You can probably find other people who will peer with you.

 (11371). there is absolutely no reason for a via (which may exposes the
 used software)

It helps debug operational problems.  When you ready the configuration
advice on:
  https://bitbucket.org/skskeyserver/sks-keyserver/wiki/Peering
you're reading the results of that debugging, as we've found various
problems and confirmed that avenues of debugging were correct, looking
around at other keyservers.  Speaking as someone who has helped debug a
few major issues and done most of the writing for that document, I'm
grateful to those who make it easy for others to work with them instead
of demanding that permission be requested before knowing what's going
on.  I'll certainly spend far more of my time debugging servers which
are candidates for Kristian's pool and which make data available than I
will on other servers.

You don't need to expose full version, but revealing Apache/2 provides
enough for most debugging.  If revealing even that much makes you
vulnerable, then you have bigger problems, because more intrusive
platform fingerprinting by those of malicious intent will identify your
platform anyway.

 FQDNs to use that specifiy service. dont allow anyone except fqdn which
 did ask before is far more secure. (e.g. i dont want any raccist website
 to advertise with MY services under THEIR domain, but because i cannot
 KNOW all such domains, its better to deny all and allow a few).

Go ahead, use that policy.  Find others who agree, create pool

Re: [Sks-devel] status page

2014-04-18 Thread Daniel Kahn Gillmor
On 04/18/2014 04:42 PM, Simon Lange wrote:
 bad ppl could pretend offering a public service using my machines they
 dont own nor they administre nor they run. my machines would support
 that passivly. think this is easy to understand. and also has some legal
 implications. just imagine feds want to seize all machines of some bad
 ppland pinpoint using the IPs the get from running services under
 badppl's domains... not worth the risk while easy to avoid.
 we dont gossip with everyone without handshaking first. i keep it that
 way same with the pool. :)

I'm sorry, but this concern is not related to SKS; this is the way the
internet works.

Here's another example, not related to SKS: If you reverse the string
illuminati and then append .org, and put it in your web browser, you
will find yourself instead at the homepage of an organization that
probably does not want themselves to be publicly affiliated with the
illuminati.

The nature of the SKS pool is that different people address it in
different ways.  for example, there are sub-pools that your keyserver
might be part of, and they each have different names.  There are also
other well-known names (like keys.gnupg.net) that themselves are aliased
to the pool.

If you want your SKS instance to work with the various labels and pools
that are available, you will let your SKS instance be addressed by
arbitrary names.

If you don't want your SKS instance to participate in the pool, you
don't need to answer to different names.  that's fine too; but please
don't accuse the pool coordinator (kristian) of setting up these rules
to make trouble for you or any other keyserver operator; rather, he's
trying to make it so that people who rely on any of the pools (directly
or indirectly) will always reach a functioning keyserver.  If you don't
want to be in the pool because you don't want to take the same risk that
every other web site takes, that's OK; you can still sync keys with
members of the pool, but your keyserver won't be queried by people using
the pool.

hope this helps explain the reason behind this requirement.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Am 18.04.2014 23:16, schrieb Phil Pennock:
 On 2014-04-18 at 20:24 +0200, Simon Lange wrote:
 the reason why a reverse proxy is required is, because some
  require additional security at the nodes.

 False.
ehm. nope. thats is what ive been told when i asked y the reverse proxy. ;)
but good to know. :=)

 yesterday i learned i
  have to give up control who is using his domain with my services. :/

 False.  As long as you can find people who will peer with you, you do
 not need to be in any pools at all.

thats not the topic. and its rude btw.


  currently for :80 i do accept all for ^(.*)pool.sks-keyservers.net and

 Note that Kristian's pool is considered well-run and is used as the
 target of CNAMEs by other people.  Most notably, `keys.gnupg.net` is a
 CNAME to `pool.sks-keyservers.net`.

 So if you only whitelist for a pattern which, when unbroken, is:

  ^(?:.+\.)?pool\.sks-keyservers\.net

 then you've broken access by people using the default configuration of
 GnuPG.  Kristian doesn't want those people to experience a broken
 service, so you don't get listed.

and that is written where exactly? see? thats why i req techdoc?!
but keys.gnupg.net is already covered too. ;)


 Kristian _could_ decide to only support certain CNAMEs, then
 exhaustively test for all of those working, then going through the
 song-and-dance of de-listing most sites when he adds one more CNAME.
 Instead, he just says to be listed in my pools, then on port 11371, all
 HTTP requests under `/pks/` should be passed to SKS, no matter what is
 in the Host: header.  This creates less stress, less bureaucracy, less
 of a culture of having to ask permission for every action.

allowing ALL is not a really good option. i already explained y. and a
page with techdoc which hostnames should be allowed is not much.
y using less procedure for pool reg than for gossip? whats the point
with this? because less bureaucracy? less stress?
i dont think its much stress and bureaucracy to tell ppl what hostnames
should be able to use the service.


  domains using our services. its a matter of respect AND security. its an
  optin feature not a optout.

 Absolutely: you don't need to be listed in a pool, there is no hard
 requirement for it.

right and you dont need to learn anything anymore since u know
everything. oh wait. ;)
try being less rude and try please to follow arguments.


 _I_ won't give away _my_ bandwidth for free to provide others with keys
 if they're not giving back to the community by being listed in public
 pools.  That's my choice, in not subsidising other peoples' businesses
 and hobbies from my own pocket more than I already do with my time on
 open source projects.

that just proved that you didnt understand anything i wrote. this is not
against good ppl. you dont protect your servers and your environment
against good ppl. you protect it against bad ppl. so hard to
understand?!
and exactly THATS WHY i dont allow fqdn like keys.npd.de to use my
keyserver. i dont support racist or inhuman parties/organizations. if
you dont care for your community. okay. but for ppl who do care, its a
maybe a problem to allow those ppl to advertise with services which are
not run by them.

all others are invited. gimme a short notice and i put them on. thats
the concept of optin. this is how you configure firewalls too. deny all
and tell whats allowed. in this case easy to do. thats why i really dont
unerstand ur attitude.



 That's okay.  You and I don't have to peer.  There is no one right way,

nobody talks about peering. m)

 no authority saying everyone must peer, no right to peering, no
 expectation that everyone agree.

m)


 You can probably find other people who will peer with you.

you dont get it. the topic is NOT peering. m)


  (11371). there is absolutely no reason for a via (which may exposes the
  used software)

 You don't need to expose full version, but revealing Apache/2 provides
 enough for most debugging.  If revealing even that much makes you
 vulnerable, then you have bigger problems, because more intrusive
 platform fingerprinting by those of malicious intent will identify your
 platform anyway.

you are derailing the topic.


  FQDNs to use that specifiy service. dont allow anyone except fqdn which
  did ask before is far more secure. (e.g. i dont want any raccist website
  to advertise with MY services under THEIR domain, but because i cannot
  KNOW all such domains, its better to deny all and allow a few).

 Go ahead, use that policy.  Find others who agree, create pool
 definitions which tightly control which final hostnames can be used.

you repeating urself. try arguments and read.


 Kristian has made his pool software freely available for others to use:
   https://code.google.com/p/sks-keyservers-pool/
 I have made my own pool software freely available for others to use:
   

Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Am 18.04.2014 23:39, schrieb Martin Papik:

 By the way, Phil's email explains why it's required, and now I
 understand why it's a true requirement, at least for servers in the
 pool. For non pool servers it doesn't matter.

since i only talked about the pool. well...
phil just proved that he didnt understand anything. however hes not
topic here.


  that STRONGLY depends where you living. i could tell you days
  filled with stories about really stupid feds seizing servers
  raiding homes by mistake. never underestimate them and why risking
  something when its not required to achieve a goal? ;)

 Are the German feds stupid and/or aggressive? Or are you referring to
 a different country?

it even depends where in germany you are living. try to avoid berlin. ;)

- -- 

Simon Lange Consulting  - Gaudystr. 6  - DE-10437 Berlin
Telefon: +49(0)30/89757206 Mobil: +49(0)151/22640160
- http://s-l-c.biz
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
 
iQEcBAEBAgAGBQJTUcH1AAoJELCfvQa91QO+tH0IAMjJFLiil+xlIkwpDrGtma35
EU7WILkvLOeBmx6VGLM6HmoHn3gmJEUbS2Ctk399JEAes608vqHCwM5ge1bnE7fG
dVxOi5k7VErT+ijfMe3Qd3pYhYAnaWrP8s9HaqmkLosqxgdMQExI4y2wc5WvyCuT
OotPHrrRZ9muzphnbj0zLx0laNOVozd2tT3LCQB/IRx+AllHm9hl6Mywtfmk5+oQ
f7YHWa5TMxLkDs+/b7WcRNlX5BwxZtEH1wfR9L+//Pnjvp2+802DS+6sDyP4zFGq
cd70UVnLHgiRsE5Va0YV27OAX2AB/EgT8Lhc8gUHJdQs0l7O9QDQ4W7s77qYuv4=
=F2zd
-END PGP SIGNATURE-


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Simon Lange

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Am 18.04.2014 23:24, schrieb Daniel Kahn Gillmor:
 On 04/18/2014 04:42 PM, Simon Lange wrote:
 bad ppl could pretend offering a public service using my machines they
 dont own nor they administre nor they run. my machines would support
 that passivly. think this is easy to understand. and also has some legal
 implications. just imagine feds want to seize all machines of some bad
 ppland pinpoint using the IPs the get from running services under
 badppl's domains... not worth the risk while easy to avoid.
 we dont gossip with everyone without handshaking first. i keep it that
 way same with the pool. :)

 I'm sorry, but this concern is not related to SKS; this is the way the
 internet works.

ehm, nope. the decision what content my machines do deliver under which
hostname ist not how the internet works. its a decision of the admin
of the machine. sure, you can use your hostname resolving my ip but
that does not mean that you get the same content as if someone tries to
use a hostname which has a directive to show that content.

 Here's another example, not related to SKS: If you reverse the string
 illuminati and then append .org, and put it in your web browser, you
 will find yourself instead at the homepage of an organization that
 probably does not want themselves to be publicly affiliated with the
 illuminati.

?! are you sure you did understand my point? that example does not
make any sense.

 The nature of the SKS pool is that different people address it in
 different ways.  for example, there are sub-pools that your keyserver
 might be part of, and they each have different names.  There are also
 other well-known names (like keys.gnupg.net) that themselves are aliased
 to the pool.

yeah but that is not the point.

 If you want your SKS instance to work with the various labels and pools
 that are available, you will let your SKS instance be addressed by
 arbitrary names.

not really. i decide what pool i may want to be in. gnupg and
sks-keyservers are okay. but that is not an invitation to allow the rest
of the world to pinpoint their FQDN to my service-ip using it under
their name. i did even reason why this is not a good idea. by now noone
told me a good reason to take the risk instead of gently asking.

 If you don't want your SKS instance to participate in the pool, you
 don't need to answer to different names.  that's fine too; but please
 don't accuse the pool coordinator (kristian) of setting up these rules
 to make trouble for you or any other keyserver operator; rather, he's

acusing? m) i did suggest not to require a no matter what hostname
comes policy. i did suggest he writes what his check-script is
checking so admins may configure their servers in a way to fullfill his
needs. THATS less stress.
getting information drop by drop is ineffective and more stress. sure,
he can ignore it. on the other hand i wouldnt ignore it if would be him.
because some good documentation (techdoc) would avoid many questions
many threads and many time answering them. ;)


 trying to make it so that people who rely on any of the pools (directly
 or indirectly) will always reach a functioning keyserver.  If you don't
 want to be in the pool because you don't want to take the same risk that
 every other web site takes, that's OK; you can still sync keys with
 members of the pool, but your keyserver won't be queried by people using
 the pool.

again. its not a matter of the pool. its a matter y allowing OTHER
fqdn than the sks-keyservers pool to access under their fqdn?!
is it really so hard to understand?


 hope this helps explain the reason behind this requirement.

i see the luxury point but not why not changing it and why not
documentating the requiremnts of his check-script.


 --dkg

Simon

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
 
iQEcBAEBAgAGBQJTUcW6AAoJELCfvQa91QO+43cH/0uKtzsPrLobdinyhS6Q8qzk
M0+hGp7zaN9XPgzrv2QPoh5ptIwErou9kx33XTR39XZgTPbBfZmv5QttcRp3EbDq
75/MT3lomkgZHVnHu7FeGTuRhdx5ntTHMkXQKARWLWK1FlKt15DfarVpGAJJBaG8
N/YMmSbjUeIuVRHJoM2Mer6DLSFrLEaQAlBz3KKpYCJjVZ5CNdvcqFtFnbJ5ib+7
mGShy6NvdLoucu1OVHS35gW0MqDqve540rfNyORWQdLZuyyMLZTb3mYPKJLM2J9g
n/CM9QyzBkD6eoFZNvU8ioVz6GXs5QcRd9mmZx4yH5p4+7HtOtu+scnTGY+zXp4=
=ynWh
-END PGP SIGNATURE-


___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-18 Thread Phil Pennock
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 2014-04-19 at 02:21 +0200, Simon Lange wrote:
 Am 18.04.2014 23:16, schrieb Phil Pennock:
  -Phil
 
 *PLONK*

Could someone please do me a kindness and pass on a message to Mr Lange?

Maintaining a keyserver peering requires the ability to communicate,
because each peer is able to cause operational problems for the other.
If we can't communicate, I am unwilling to peer because when problems
happen, they can't be resolved.

So applying a killfile rule (which is what plonk means to me) while
maintaining a peering is deeply problematic.

Thus I have removed the line for his keyserver from the membership file
of my keyserver.

Thanks,
- -Phil
-BEGIN PGP SIGNATURE-

iQEcBAEBCAAGBQJTUgyYAAoJEKBsj+IM0duFIecH/j25Kewr6MY6HBa8QPzpLFff
H+Zrmu3yZujeEWKCIyCflrsjsOrOrN2dwr3nhK3zgkRHurCAGDB2+iQkHFey30O4
j/N8z/oNKq/kZdvB1fsDtO6O4YU3LrzKHvVVWc3jDqmA77SpSKsQP1AQ84GiwF8U
evtqF+qeu7LankiwPqy5KWABETRAfiy1L6/olqclVGgGxWWzSldUi+JVY8HY1Zpg
4znz43oUStyTnv1xKzzlHwQD+5VGx+vmEbRQ1T0QynMf5II/P7E8z0smKG4RaSsC
lAAxg0kj5SpaFMc8Dwv8RY5Zbw5BfDoxLiIax2W5QlelSgh07WxZWFbsJX8CrJw=
=GYhD
-END PGP SIGNATURE-

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-17 Thread Tobias Frei
Hi,

from the status page you've linked:

Latest status: Not OK
Reason: Not running a reverse proxy


Best regards,
Tobias Frei

Am 17.04.2014 01:13, schrieb Simon Lange:
 Hi,
 
 im a it supprised. i just stumbled over: 
 https://sks-keyservers.net/status/info/keys.s-l-c.biz
 
 which says that my keyserver was last seen three days ago. im not 
 enlisted anymore and the status page cannot even say what server
 im running etc etc
 
 im a bit wondered. why? i can reach it via 11370 11371 and 443
 
 proof? simon@entertain:~$ gpg --keyserver hkp://keys.s-l-c.biz
 --search-key m...@simonlange.eu gpg: searching for
 m...@simonlange.eu from hkp server keys.s-l-c.biz (1) Simon
 Lange m...@simonlange.eu 2048 bit RSA key BDD503BE, created:
 2009-09-04 Keys 1-1 of 1 for m...@simonlange.eu.  Enter
 number(s), N)ext, or Q)uit 
 
 works like charme.
 
 via browser? see attachment (screenshot). works too. ;)
 
 recon works too 2014-04-17 01:12:04 Beginning recon as server,
 client: ADDR_INET [162.243.102.241]:59001 2014-04-17 01:12:04
 Joining reconciliation 2014-04-17 01:12:04 Reconciliation complete 
 2014-04-17 01:12:04 2 hashes recovered from ADDR_INET 
 [162.243.102.241]:11371 2014-04-17 01:12:04
 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:04
 1177F736C69004B45FA475ACB149F894 2014-04-17 01:12:04 Disabling
 gossip 2014-04-17 01:12:14 Requesting 2 missing keys from
 ADDR_INET [162.243.102.241]:11371, starting with
 02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:14 2 keys
 received
 
 
 so why is my server not enlisted anymore? what are the exactly port
 protocols you are checking?!
 
 id like to prevent such a status page although keyserver is still
 up n running. oO
 
 thanks for your help
 
 Simon
 
 
 
 
 ___ Sks-devel mailing
 list Sks-devel@nongnu.org 
 https://lists.nongnu.org/mailman/listinfo/sks-devel
 



smime.p7s
Description: S/MIME Cryptographic Signature
___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


Re: [Sks-devel] status page

2014-04-17 Thread Simon Lange (BIT)

well, but there IS a reverse proxy. ;)

tcp0  0 78.46.21.218:11371  0.0.0.0:*   
LISTEN  8804/lighttpd
tcp0  0 127.0.0.1:11371 0.0.0.0:*   
LISTEN  10018/sks
tcp6   0  0 2a01:4f8:201:22e3:11371 :::*
LISTEN  8804/lighttpd



Am 2014-04-17 15:56, schrieb Tobias Frei:

Hi,

from the status page you've linked:

Latest status: Not OK
Reason: Not running a reverse proxy


Best regards,
Tobias Frei

Am 17.04.2014 01:13, schrieb Simon Lange:

Hi,

im a it supprised. i just stumbled over:
https://sks-keyservers.net/status/info/keys.s-l-c.biz

which says that my keyserver was last seen three days ago. im not
enlisted anymore and the status page cannot even say what server
im running etc etc

im a bit wondered. why? i can reach it via 11370 11371 and 443

proof? simon@entertain:~$ gpg --keyserver hkp://keys.s-l-c.biz
--search-key m...@simonlange.eu gpg: searching for
m...@simonlange.eu from hkp server keys.s-l-c.biz (1) Simon
Lange m...@simonlange.eu 2048 bit RSA key BDD503BE, created:
2009-09-04 Keys 1-1 of 1 for m...@simonlange.eu.  Enter
number(s), N)ext, or Q)uit 

works like charme.

via browser? see attachment (screenshot). works too. ;)

recon works too 2014-04-17 01:12:04 Beginning recon as server,
client: ADDR_INET [162.243.102.241]:59001 2014-04-17 01:12:04
Joining reconciliation 2014-04-17 01:12:04 Reconciliation complete
2014-04-17 01:12:04 2 hashes recovered from ADDR_INET
[162.243.102.241]:11371 2014-04-17 01:12:04
02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:04
1177F736C69004B45FA475ACB149F894 2014-04-17 01:12:04 Disabling
gossip 2014-04-17 01:12:14 Requesting 2 missing keys from
ADDR_INET [162.243.102.241]:11371, starting with
02D4107B2181C750E8EE7E18A96FBF61 2014-04-17 01:12:14 2 keys
received


so why is my server not enlisted anymore? what are the exactly port
protocols you are checking?!

id like to prevent such a status page although keyserver is still
up n running. oO

thanks for your help

Simon




___ Sks-devel mailing
list Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel




___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel


--
Simon Lange
Chief Technology Officer

Bundes IT GbR
Gaudystr. 6
DE-10437 Berlin

FON: +49 [0]30 89757206
FAX: +49 [0]30 89757207
CEL: +49 [0]15122640160
WWW: https://www.Bundes.IT

___
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel