-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dear all,
As previously discussed on this list, and listed as issue 5 in the tracker[0], a more dynamic approach to inclusion in the server pool is favorable to the current approach of difference to a reference keyserver (currently keys.kfwebs.net). I've finally gotten around to playing a bit with this, and today committed a change as revision r86[1]. The process, as it stands now is as follows. Pass 1: Calculate the mean and standard deviation of all servers found to be online on HKP and have more keys than 3 million (sks is add-only, and we know this point is passed). This results in : Numkey set to 3064847.4236372 based on mean - 0.5 * 10048.894104989 Pass 2: Exclude all servers that have less keys than 1 stddev away as calculated in pass 1, calculate new mean and stddev and then exclude all servers with less keys than 0.5 stddev away from mean. This results in Numkey set to 3070944.3992914 based on mean - 0.5 * 1453.4176334218 I've added some more information to the status page[2], which currently reads (note, lower bound has a slight discrepancy to the numkey of pass 2 due to different run between debug and production): Lower bound of keys: 3070937 Mean: 3071671 Max difference: 733 The primary advantage of this change, is of course that the pool isn't dependent on a single keyserver anymore to function. Also, it should handle larger key jiffers e.g. in events of a keyserver starting to synchronize again and contributing larger number of keys than average. Comments are, as usual, appreciated. [0] http://code.google.com/p/sks-keyservers-pool/issues/detail?id=5 [1] http://code.google.com/p/sks-keyservers-pool/source/detail?r=86 [2] http://sks-keyservers.net/status/ - -- - ---------------------------- Kristian Fiskerstrand http://www.sumptuouscapital.com Twitter: @krifisk - ---------------------------- Corruptissima re publica plurimæ leges The greater the degeneration of the republic, the more of its laws - ---------------------------- This email was digitally signed using the OpenPGP standard. If you want to read more about this The book: Sending Emails - The Safe Way: An introduction to OpenPGP security is now available in both Amazon Kindle and Paperback format at http://www.amazon.com/dp/B006RSG1S4/ - ---------------------------- Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.17 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJPgyVLAAoJEBbgz41rC5UI3lYP/3hvzTk5jcD5LxA69+iCcnCK UCoj1DE1ZWCEH0irnVsbHkMrilsDlqjKobFXvd9lShKawpuFKr1BviKmvK/aBFz1 1q6zzCK1uOFbre7r45+99HNeBOFNxdZcoTnb0pgXdeTFAx7IV0LBLOfJOXeULY2I Ea63+/l/BdXXa/EF++imEBAdLrPLgoifolVIjHQu41K9MGDGz7bTfi6tAwRyLMIO kfJmVLkGRFsJIbuSMi3s5tZ1ZOa0b73EqVQ6N9qglwI0fSRWgSW0U2UA8g1zaNM6 B1zLa3W58PKjtykfZL0EJGpfWhW4wKTYkxidw/Kdt/CyMshosWISYDIgknelNByB k/YpwBAnsXjSlWVQW1G7tkUSiUus0as002dNmGUSlArLknMooL+uYk7k0PSg8RWt M3FGaynV1Ae9QxoErbjum7/UOfyXGbDMgderj/QfO0RDPy9S7pR2uLsAStKh+Md2 9YALtsnIEB4MTINosaIyQCaD+rG7cCbV3E/CdRb/yNMmadxCdjIWto5GwHnLkH9m Md0Vm7eqDj2gYzXuW//nVfz8Qhpe+eEp/IrdOwce/U1sOrLZ3dCXf6v0yRXkzZHB 5WrfAdmWSpxh1miLi/WvaiXvUuNnFtJPdsTmuU/8+oaAZxTysOd95o6OvA1Ih/cN TfGk3BToSyeIFDqKosky =FbqL -----END PGP SIGNATURE----- _______________________________________________ Sks-devel mailing list Sks-devel@nongnu.org https://lists.nongnu.org/mailman/listinfo/sks-devel