[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Sks-devel] pgp.mit.edu upgraded to SKS 1.1.4
From: |
Kristian Fiskerstrand |
Subject: |
Re: [Sks-devel] pgp.mit.edu upgraded to SKS 1.1.4 |
Date: |
Thu, 12 Dec 2013 13:21:54 +0100 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.1 |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 12/12/2013 01:45 AM, Jonathon Weiss wrote:
>
> Hello All,
Hi Jonathon,
>
> I know there are people out there who pay more attention to
> pgp.mit.edu than to the average keyserver. So I wanted to let
> folks know that pgp.mit.edu has been upgraded to SKS 1.1.4. Also
> of note is that it now allows queries on either port 80 or 11371
> (and yes Apache is fronting both ports), so users behind
> restrictive firewalls can now access the system. Please let us
> know if you detect any problems.
>
Thanks for upgrading, it is indeed a server that experience a higher
load than most, so a good test case for a lot of things[a].
In any case, the setup looks good with the exception of no Via header
being reported despite being behind apache, and as there is no rewrite
of Server: headers, my pool crawler doesn't detect the reverse proxy.
If you want this being detected, please set ProxyVia; there is an
Apache example config at [0].
Endnotes:
[a] Depending on load it might even make sense to load-balance it with
multiple instances?
References:
[0] https://bitbucket.org/skskeyserver/sks-keyserver/wiki/Peering
- --
- ----------------------------
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- ----------------------------
Bene diagnoscitur, bene curatur
Something that is well diagnosed can be cured well
-----BEGIN PGP SIGNATURE-----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=oj1T
-----END PGP SIGNATURE-----