You are not logged in.
Pages: 1
Hi! I will have some spare disk, compute and network in the near future and I'm thinking about using it for a public tier 2 mirror for arch.
After reviewing the wiki I see that the current used protocols are rsync, http and https. After review the http is still supported by a lot of mirrors.
Having let's encrypt certificates, is there any advantage that I'm not aware of for having http support at mirrors?
Offline
These days? No.
Inofficial first vice president of the Rust Evangelism Strike Force
Offline
https://wiki.archlinux.org/title/Develo … quirements
http or https support
Offline
Thanks for the answers, https only will be then.
Offline
Using http releaves you from renewing certificates which although could be automated introduces another vector of attack on your ever reducing privacy surface. Especially when using anonymizing network layers centralized certs infra and https add only negatives.
BTW what is Arch gatekeepers stance on 2-tier mirrors provided via onion addresses, are there some semi-official servers to try sync from?
Offline
bibies:
Did you notice this is an over two month old thread?
In either case, not sure what “reducing privacy surface” is. Automatic and manual renewals peform the same operations and send the same data, so there is no direct difference in privacy. If one would really want to find one, it’s with manual renewals: it reveals server operator’s activity patterns. With 4 datapoints a year this is garbage data of course.
Not sure, what kind of attack vector does automatic renewal introduces compared to manual one.
Regarding Tor HS access: I am not the right person to give authoritative response on Arch’s stance. Fortunately Tor’s stance on pushing large amounts of data over Tor is known for years and it is negative (1, 2), because it puts unreasonable load on the network. A second problem is that, unless additional steps are taken, the requested packages set fingerprints the machine.
Daklon:
While users should use HTTPS, a server offering a plaintext alternative may still be of value. This shouldn’t normally be needed, but in some rare cases the user may have certificate chains broken or no TLS support. Then non-TLS connections remain the only option.
Sometimes I seem a bit harsh — don’t get offended too easily!
Offline
Did you notice this is an over two month old thread?
How does that relevant to the subject?
In either case, not sure what “reducing privacy surface” is. Automatic and manual renewals peform the same operations and send the same data, so there is no direct difference in privacy. If one would really want to find one, it’s with manual renewals: it reveals server operator’s activity patterns. With 4 datapoints a year this is garbage data of course. Not sure, what kind of attack vector does automatic renewal introduces compared to manual one.
Reducing privacy surface means expanding vulnerabilities to traffic analysis and fingerprinting. I didn't mean to distinguish auto and manual renewing but rather the mere requirement to use certs causing periodic regular extra connections to the third party.
Regarding Tor HS access: I am not the right person to give authoritative response on Arch’s stance. Fortunately Tor’s stance on pushing large amounts of data over Tor is known for years and it is negative (1, 2), because it puts unreasonable load on the network. A second problem is that, unless additional steps are taken, the requested packages set fingerprints the machine.
Tor wasn't made to keep in museum. Throttling is OK and even desirable for many sensible scenarios. The fingerprinting argument is laughable as Clearnet connections has zero protection there. Hopefully Arch won't trail in the tail distro and will mitigate resiliency concerns by allowing and encouraging more decentralizing syncing of its repos in a privacy conscious manner.
Offline
Keep in mind that very few mirrors are maintained by archlinux itself (probably just archlinux.org) .
https://archlinux.org/mirrors/ doesn't appear to list any tor mirrors, maybe you would like to be the first one to provide a tier 2 mirror using a .onion domain ?
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
https://archlinux.org/mirrors/ doesn't appear to list any tor mirrors, maybe you would like to be the first one to provide a tier 2 mirror using a .onion domain ?
Some derivative distros had onion mirrors, not sure what the situation looks like today.
Maybe folks start to have onion mirrors, but the first step would be to have an Arch policy as response to the quote:
BTW what is Arch gatekeepers stance on 2-tier mirrors provided via onion addresses, are there some semi-official servers to try sync from?
Offline
this forum is not the place where policies are determined .
https://wiki.archlinux.org/title/Develo … ling_lists mentions a mailing list and an email address.
Maybe use one of those ?
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
Pages: 1