[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Sks-devel] peering broken for keyservers using reverse-proxies?
From: |
Kristian Fiskerstrand |
Subject: |
Re: [Sks-devel] peering broken for keyservers using reverse-proxies? |
Date: |
Mon, 09 Apr 2012 22:33:35 +0200 |
User-agent: |
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:11.0) Gecko/20120312 Thunderbird/11.0 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 05.04.2012 02:02, Ryan wrote:
> I had problems reverse proxying 11371 behind a load balancer; would
> break other sks servers fetching keys.
>
> What I ended up doing was configure SKS to use 21371 on external
> interface and the proxy on 11371; other SKS servers started
> fetching keys off 21371 and bypassing the proxy yet clients always
> hit the proxy.
>
> I think the issue was fixed in latest SKS but alot of servers are
> not running it yet so this is my work-arround.
Ditto for me, although on port 11372. This is, however, firewall
restricted to IPs of my peers.
- --
- ----------------------------
Kristian Fiskerstrand
http://www.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Corruptissima re publica plurimæ leges
The greater the degeneration of the republic, the more of its laws
- ----------------------------
This email was digitally signed using the OpenPGP
standard. If you want to read more about this
The book: Sending Emails - The Safe Way: An
introduction to OpenPGP security is now
available in both Amazon Kindle and Paperback
format at
http://www.amazon.com/dp/B006RSG1S4/
- ----------------------------
Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/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=KQ21
-----END PGP SIGNATURE-----