sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] How long should gossip be disabled?


From: Darryl Ross
Subject: Re: [Sks-devel] How long should gossip be disabled?
Date: Sat, 22 Jan 2005 14:13:33 +1030
User-agent: Mozilla Thunderbird 1.0 (Windows/20041206)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yaron Minsky wrote:
| Just to clarify, gossip remains disabled until you've gotten all the
| keys you discovered you were missing.  So the question in my mind is,
| are you still fetching keys?  Do you see messages indicating that
| you're sending out requests for more keys, processing those, and
| adding them to your keyserver?

Yeah, it's still trying to pull down keys. As I mentioned in one of my
other posts, the key count on my server is almost 14,000 less than the
others.

There seems to be a number of keys that can't be synced as well:

address@hidden sks]# wc -l diff*
~  18 diff-129.128.98.22_11371.txt
~   2 diff-161.53.2.67_11371.txt
~   0 diff-193.196.36.4_11371.txt
~   0 diff-212.242.141.114_11371.txt
~   0 diff-213.141.74.169_11371.txt
~   1 diff-213.146.108.162_11371.txt
~  16 diff-217.160.110.197_11371.txt
~   1 diff-62.116.124.106_11371.txt
~   1 diff-66.119.199.39_11371.txt
~   1 diff-66.93.100.200_11371.txt
~  40 total

That total count has not dropped below 40 in 2 days (I'm running that
command in cron every hour). Sometimes it's been up to about 70, but it
comes back down again to about 40.

A previous thread I found in the archives said that the keys might not
be making it through the recon filters and by submitting them a
different way they might be merged in. What I've done is written a
script (attached) which tries to download all of those hashes from all
my my peers (and also myself), load them into a gpg keyring and then
submit to all of my peers. Doesn't seem to have made a difference
though, they still are "stuck".

| Maybe you could post a file with 100 or so lines from the logfile.

You didn't say which logfile, so I've given you the last 100 lines from
both log.db and log.recon.

Thanks
Darryl

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)

iD8DBQFB8cvl/XQ6DbmPjokRAp7jAJ4yT8Pl+Tf5ijuhR+klZzLo/qFT/gCdEZ9E
yqXYMT1wv5LeucIAx4K93BY=
=Brtx
-----END PGP SIGNATURE-----
2005-01-22 13:49:33 74 keys found
2005-01-22 13:49:35 100 keys found
2005-01-22 13:49:40 100 keys found
2005-01-22 13:49:46 74 keys found
2005-01-22 13:50:24 100 keys found
2005-01-22 13:50:36 100 keys found
2005-01-22 13:50:47 100 keys found
2005-01-22 13:50:58 100 keys found
2005-01-22 13:51:08 100 keys found
2005-01-22 13:51:12 Applying 0 changes
2005-01-22 13:51:21 100 keys found
2005-01-22 13:51:31 100 keys found
2005-01-22 13:51:41 100 keys found
2005-01-22 13:51:46 100 keys found
2005-01-22 13:51:57 100 keys found
2005-01-22 13:52:05 100 keys found
2005-01-22 13:52:15 74 keys found
2005-01-22 13:52:18 100 keys found
2005-01-22 13:52:20 100 keys found
2005-01-22 13:52:23 100 keys found
2005-01-22 13:52:27 100 keys found
2005-01-22 13:52:30 100 keys found
2005-01-22 13:52:33 100 keys found
2005-01-22 13:52:37 100 keys found
2005-01-22 13:52:40 100 keys found
2005-01-22 13:52:43 100 keys found
2005-01-22 13:52:47 100 keys found
2005-01-22 13:52:49 100 keys found
2005-01-22 13:52:52 74 keys found
2005-01-22 13:53:42 Applying 0 changes
2005-01-22 13:54:49 Applying 2 changes
2005-01-22 13:54:49 Adding hash 71FAE7017DCA40CAEEEA44F302442098
2005-01-22 13:54:49 Del'ng hash 72DF64FCDC993F63A3DCC370A7812448
2005-01-22 13:54:50 Sending LogResp size 2
2005-01-22 13:54:56 100 keys found
2005-01-22 13:54:59 100 keys found
2005-01-22 13:55:02 100 keys found
2005-01-22 13:55:08 100 keys found
2005-01-22 13:55:10 Error fetching key from hash 
72DF64FCDC993F63A3DCC370A7812448: Not_found
2005-01-22 13:55:10 99 keys found
2005-01-22 13:55:15 100 keys found
2005-01-22 13:55:17 100 keys found
2005-01-22 13:55:21 100 keys found
2005-01-22 13:55:24 100 keys found
2005-01-22 13:55:27 100 keys found
2005-01-22 13:55:30 100 keys found
2005-01-22 13:55:32 75 keys found
2005-01-22 13:56:04 Applying 0 changes
2005-01-22 13:57:16 Applying 1 changes
2005-01-22 13:57:16 Adding hash 1B63DB24461E50CD39403C1A33E50BD5
2005-01-22 13:57:16 Sending LogResp size 1
2005-01-22 13:57:22 100 keys found
2005-01-22 13:57:28 100 keys found
2005-01-22 13:57:36 100 keys found
2005-01-22 13:57:41 100 keys found
2005-01-22 13:57:48 100 keys found
2005-01-22 13:57:56 100 keys found
2005-01-22 13:58:01 100 keys found
2005-01-22 13:58:06 100 keys found
2005-01-22 13:58:11 100 keys found
2005-01-22 13:58:16 100 keys found
2005-01-22 13:58:21 100 keys found
2005-01-22 13:58:27 74 keys found
2005-01-22 13:58:37 100 keys found
2005-01-22 13:58:40 100 keys found
2005-01-22 13:58:46 100 keys found
2005-01-22 13:58:51 100 keys found
2005-01-22 13:58:56 100 keys found
2005-01-22 13:59:01 100 keys found
2005-01-22 13:59:05 100 keys found
2005-01-22 13:59:08 100 keys found
2005-01-22 13:59:12 100 keys found
2005-01-22 13:59:18 100 keys found
2005-01-22 13:59:23 100 keys found
2005-01-22 13:59:29 74 keys found
2005-01-22 13:59:53 100 keys found
2005-01-22 13:59:58 100 keys found
2005-01-22 14:00:02 100 keys found
2005-01-22 14:00:09 100 keys found
2005-01-22 14:00:15 100 keys found
2005-01-22 14:00:20 100 keys found
2005-01-22 14:00:26 100 keys found
2005-01-22 14:00:32 100 keys found
2005-01-22 14:00:37 100 keys found
2005-01-22 14:00:43 100 keys found
2005-01-22 14:00:49 100 keys found
2005-01-22 14:00:54 74 keys found
2005-01-22 14:01:18 Applying 0 changes
2005-01-22 14:02:06 100 keys found
2005-01-22 14:02:16 Applying 1 changes
2005-01-22 14:02:16 Adding hash E71ED532D4B4D33EB189F3D4A366F6BD
2005-01-22 14:02:17 Sending LogResp size 1
2005-01-22 14:02:21 100 keys found
2005-01-22 14:02:27 100 keys found
2005-01-22 14:02:32 100 keys found
2005-01-22 14:02:46 100 keys found
2005-01-22 14:02:49 100 keys found
2005-01-22 14:02:54 100 keys found
2005-01-22 14:03:00 100 keys found
2005-01-22 14:03:07 100 keys found
2005-01-22 13:16:34 <recon as client> callback timed out.
2005-01-22 13:17:45 14 hashes recovered from <ADDR_INET 129.128.98.22:11371>
2005-01-22 13:17:45 Reconciliation attempt from <ADDR_INET 
217.160.110.197:42044> while gossip disabled. Ignoring.
2005-01-22 13:17:45 Requesting 14 missing keys from <ADDR_INET 
129.128.98.22:11371>, starting with 13E37C592A17EA2A345ED114BEA5D281
2005-01-22 13:17:47 14 keys received
2005-01-22 13:19:01 Reconciliation attempt from unauthorized host <ADDR_INET 
161.53.2.67:59487>.  Ignoring
2005-01-22 13:19:49 Reconciliation attempt from unauthorized host <ADDR_INET 
217.160.110.197:42048>.  Ignoring
2005-01-22 13:21:21 <recon as client> error in callback.: End_of_file
2005-01-22 13:22:08 Reconciliation attempt from unauthorized host <ADDR_INET 
193.196.36.4:46969>.  Ignoring
2005-01-22 13:22:22 <recon as client> error in callback.: End_of_file
2005-01-22 13:23:31 18 hashes recovered from <ADDR_INET 129.128.98.22:11371>
2005-01-22 13:23:36 Requesting 18 missing keys from <ADDR_INET 
129.128.98.22:11371>, starting with 13E37C592A17EA2A345ED114BEA5D281
2005-01-22 13:23:38 18 keys received
2005-01-22 13:23:44 Added 8 hash-updates. Caught up to 1106362419.281737
2005-01-22 13:25:17 <recon as client> callback timed out.
2005-01-22 13:26:27 Hashes recovered from <ADDR_INET 66.119.199.39:11371>
2005-01-22 13:26:27     194FF67AE065853D4DDF778B5F63FA38
2005-01-22 13:26:31 Requesting 1 missing keys from <ADDR_INET 
66.119.199.39:11371>, starting with 194FF67AE065853D4DDF778B5F63FA38
2005-01-22 13:26:32 1 keys received
2005-01-22 13:26:32 Added 1 hash-updates. Caught up to 1106362592.373113
2005-01-22 13:27:40 <recon as client> error in callback.: Sys_error("Connection 
reset by peer")
2005-01-22 13:29:17 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:29:17     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:29:17 Reconciliation attempt from <ADDR_INET 66.119.199.39:36190> 
while gossip disabled. Ignoring.
2005-01-22 13:29:17 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:29:26 1 keys received
2005-01-22 13:29:40 Reconciliation attempt from unauthorized host <ADDR_INET 
193.196.36.4:46988>.  Ignoring
2005-01-22 13:31:53 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:31:53     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:32:05 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:32:11 1 keys received
2005-01-22 13:33:00 <recon as client> error in callback.: Sys_error("Connection 
reset by peer")
2005-01-22 13:33:55 Reconciliation attempt from unauthorized host <ADDR_INET 
193.196.36.4:47002>.  Ignoring
2005-01-22 13:34:39 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:34:39     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:34:40 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:34:50 1 keys received
2005-01-22 13:35:40 <recon as client> error in callback.: End_of_file
2005-01-22 13:35:53 Reconciliation attempt from unauthorized host <ADDR_INET 
161.53.2.67:59529>.  Ignoring
2005-01-22 13:37:07 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:37:07     1E446FAADE7C02DC489CC6BBB899CE2A
2005-01-22 13:37:07     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:37:10 Requesting 2 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with 1E446FAADE7C02DC489CC6BBB899CE2A
2005-01-22 13:37:17 2 keys received
2005-01-22 13:37:23 Added 1 hash-updates. Caught up to 1106363238.037373
2005-01-22 13:38:32 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:38:32     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:38:33 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:38:44 1 keys received
2005-01-22 13:40:27 Reconciliation attempt from unauthorized host <ADDR_INET 
217.160.110.197:42094>.  Ignoring
2005-01-22 13:42:13 <recon as client> error in callback.: End_of_file
2005-01-22 13:43:54 <recon as client> error in callback.: Sys_error("Connection 
reset by peer")
2005-01-22 13:45:16 Hashes recovered from <ADDR_INET 212.242.141.114:11371>
2005-01-22 13:45:16     0AAE0DB3E10780D820EBCC98250341BC
2005-01-22 13:45:16     F363846FA5FAFC58AF699D49D4E881C9
2005-01-22 13:45:19 Requesting 2 missing keys from <ADDR_INET 
212.242.141.114:11371>, starting with 0AAE0DB3E10780D820EBCC98250341BC
2005-01-22 13:45:21 2 keys received
2005-01-22 13:45:24 Added 3 hash-updates. Caught up to 1106363721.883675
2005-01-22 13:46:29 Hashes recovered from <ADDR_INET 213.146.108.162:11371>
2005-01-22 13:46:29     37A36E72C6048CA2A90901372450B293
2005-01-22 13:46:32 Requesting 1 missing keys from <ADDR_INET 
213.146.108.162:11371>, starting with 37A36E72C6048CA2A90901372450B293
2005-01-22 13:46:34 1 keys received
2005-01-22 13:48:34 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:48:34     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:49:22 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:49:29 1 keys received
2005-01-22 13:50:58 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:50:58     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:51:01 Reconciliation attempt from <ADDR_INET 193.196.36.4:47068> 
while gossip disabled. Ignoring.
2005-01-22 13:51:01 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:51:09 1 keys received
2005-01-22 13:52:06 Reconciliation attempt from unauthorized host <ADDR_INET 
193.196.36.4:47071>.  Ignoring
2005-01-22 13:52:49 Reconciliation attempt from unauthorized host <ADDR_INET 
161.53.2.67:59565>.  Ignoring
2005-01-22 13:53:33 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 13:53:33     FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:53:35 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 13:53:42 1 keys received
2005-01-22 13:54:45 Hashes recovered from <ADDR_INET 66.119.199.39:11371>
2005-01-22 13:54:45     71FAE7017DCA40CAEEEA44F302442098
2005-01-22 13:54:47 Requesting 1 missing keys from <ADDR_INET 
66.119.199.39:11371>, starting with 71FAE7017DCA40CAEEEA44F302442098
2005-01-22 13:54:49 1 keys received
2005-01-22 13:54:50 Added 2 hash-updates. Caught up to 1106364289.152006
2005-01-22 13:56:01 Hashes recovered from <ADDR_INET 213.146.108.162:11371>
2005-01-22 13:56:01     72DF64FCDC993F63A3DCC370A7812448
2005-01-22 13:56:02 Requesting 1 missing keys from <ADDR_INET 
213.146.108.162:11371>, starting with 72DF64FCDC993F63A3DCC370A7812448
2005-01-22 13:56:04 1 keys received
2005-01-22 13:57:12 Hashes recovered from <ADDR_INET 62.116.124.106:11371>
2005-01-22 13:57:12     1B63DB24461E50CD39403C1A33E50BD5
2005-01-22 13:57:15 Requesting 1 missing keys from <ADDR_INET 
62.116.124.106:11371>, starting with 1B63DB24461E50CD39403C1A33E50BD5
2005-01-22 13:57:16 1 keys received
2005-01-22 13:57:16 Added 1 hash-updates. Caught up to 1106364436.181252
2005-01-22 14:01:07 Hashes recovered from <ADDR_INET 66.93.100.200:11371>
2005-01-22 14:01:07     FD37BBEE96326CC863FF2780511134DB
2005-01-22 14:01:09 Requesting 1 missing keys from <ADDR_INET 
66.93.100.200:11371>, starting with FD37BBEE96326CC863FF2780511134DB
2005-01-22 14:01:18 1 keys received
2005-01-22 14:02:06 Hashes recovered from <ADDR_INET 62.116.124.106:11371>
2005-01-22 14:02:06     E71ED532D4B4D33EB189F3D4A366F6BD
2005-01-22 14:02:16 Requesting 1 missing keys from <ADDR_INET 
62.116.124.106:11371>, starting with E71ED532D4B4D33EB189F3D4A366F6BD
2005-01-22 14:02:16 1 keys received
2005-01-22 14:02:17 Added 1 hash-updates. Caught up to 1106364736.810965
#!/bin/sh

rm ~/.gnupg/pubring.gpg
rm ~/.gnupg/pubring.gpg~
rm /tmp/key.gpg

cd /opt/sks
for diff in `cat diff*`; do 
        echo "Hash: ${diff}"
        echo "Hash: ${diff}" >> /tmp/key.pgp
        for server in keyserver.afoyi.com `cat membership | cut -f 1`; do 
                echo "  -> ${server}"
                echo "  ----------------> ${server}" >> /tmp/key.gpg
                links -source 
"http://${server}/pks/lookup?fingerprint=off&hash=on&op=hget&search=${diff}"; >> 
/tmp/key.gpg
        done
        echo ''
        echo '' >> /tmp/key.gpg
        echo ''
        echo '' >> /tmp/key.gpg
done

cat /tmp/key.gpg | gpg --import
for server in keyserver.afoyi.com `cat membership | cut -f 1`; do 
        gpg --keyserver ${server} --send-keys --yes
done

reply via email to

[Prev in Thread] Current Thread [Next in Thread]