We are running a normal sks instance to keep up with the peering - the
- the snapshot is then used in another VM for testing.
Post by Andrew GallagherPost by Hendrik VisageYou canât do it using recon, because any additions to the test server
will cause the key delta to diverge and recon will eventually fail.
Do you mean that the recon *needs* a similar from the destination?
Unless recon is enabled in both directions, the key delta will
inevitably grow to the point that recon will fail. It might take a long
time, but it will happen eventually - and as the delta grows the load on
the recon partner will increase.
Post by Hendrik VisageI donât really care about it failing,
Recon failure is very messy and affects both sides of the recon.
Post by Hendrik Visagethe idea might be to inject problem keys into
the tet environment, and the test environmentâs problem keys not to
âinfestâ the current public SKS keyservers.
The only way to reliably prevent leakage of test data into the wild is
to block all communication between test systems and production ones. A
recon that works in one direction and not the other is fine until the
day that you redeploy the server and forget to add the configuration
that blocks comms in the wrong direction!
If you rely on a highly specific configuration to prevent utter
disaster, then utter disaster is inevitable the first time something
goes wrong. And something *will* go wrong... ;-)
Post by Hendrik VisageThe type of troubles we saw, I read as something that was caused as the
updates was being reconâs between servers, after the problem keys was
already injected, thus the idea would be multiple servers to test
against, having some ingres feeeds from the public servers, but no
egress to the public side. Might be good for others to test there âtest
certs/keysâ against before actual publication??
The beauty of docker images is that you can spin up as many copies as
you like and get them to recon with each other.
For a test setup, I would strongly recommend using VMs or docker images
that have no connectivity whatsoever with the internet. Build them from
dump images and run them in an isolated environment. If you want random
people to be able to use them for testing, then enable port 80 incoming
and NOTHING ELSE. You are effectively running an infectious-prion
research lab. Treat it as such. ;-)
_______________________________________________
Sks-devel mailing list
https://lists.nongnu.org/mailman/listinfo/sks-devel