Andrew Gallagher
andrewg at andrewg.com
Mon Mar 27 19:47:00 CEST 2023
More information about the Gnupg-users mailing list
Mon Mar 27 19:47:00 CEST 2023
- Previous message (by thread): gpg-preset-passphrase and extra agent socket
- Next message (by thread): Flooding attack against synchronising keyservers
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Hi, everyone. The synchronising keyserver network has been under an intermittent flooding attack for the past five days, resulting in the addition of approximately 3 million obviously-fake OpenPGP keys to the SKS dataset. The fake keys are currently being submitted multiple times per second via a large number of Tor exit relays, making them difficult to block using normal abuse mitigations. If unaddressed, this will eventually fill up the disk of all public synchronising servers. Effective immediately, pgpkeys.eu has been temporarily disconnected from all its peers, and is blocking all key submissions. It will remain available for key lookups but will not allow key updates while the flooding attack continues. I strongly recommend that other keyserver operators take similar measures, until a more permanent solution can be deployed. A -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: Message signed with OpenPGP URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20230327/333f5f60/attachment.sig>
- Previous message (by thread): gpg-preset-passphrase and extra agent socket
- Next message (by thread): Flooding attack against synchronising keyservers
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the Gnupg-users mailing list