On Wed, Apr 28, 2010 at 6:29 PM, Jesus Cea <[email protected]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 21/04/10 02:17, Yaron Minsky wrote: >>> I am interested in knowing the *exact* algorithm/protocol SKS uses for >>> reconciliation. I have read the two papers in the main SKS webpage, but >>> it is not enough to "clone" the wire protocol and implement another >>> independent keyserver. >>> >>> I can not read ocaml sourcecode :-(. >> >> Sorry. I'm afraid the source is the only available documentation for >> the protocol. > > This is not good. An undocumented *key* feature, written in a obscure > programming language :). > > I know it is not very appropiate to post this in this mailing list but... > > I was wondering if there is any kind of demand of an alternative OpenPGP > keyserver, with a different but documented syncronization technology, > like Merkle trees. Implemented in Python. > > I apology for the off-topic and the attack to sks :(.
No apologies necessary! That said, I humbly suggest you consider just hacking on SKS. OCaml is a surprisingly pleasant language, once you get the hang of it. And it's really not as hard to learn as you might think. SKS could benefit from more developers... y _______________________________________________ Sks-devel mailing list [email protected] http://lists.nongnu.org/mailman/listinfo/sks-devel
