shaft, to random
@shaft@piaille.fr avatar

Lol, KPN (looks like a Dutch ISP) switched from old algorithm 7 to old algorithm 7 🙃

Algorithm 7 (RSASHA1-NSEC3-SHA1) is not recommended for signing (RFC 8624, section 3.1). It's place is in a museum

https://mastodns.net/@diffroot/112560492075070043

jpmens, to random
@jpmens@mastodon.social avatar

Twelve years ago I was invited to present on in Moscow. Quite the show actually: we had simulataneous translators (think: EU parliament) who translated my English to Russian and back for questions from the audience.

Imagine my surprise when I met @krisbuytaert there: he too had been invited to give a talk.

The stay was great: it allowed me to brush up on my Russian: I learned how to pronounce 'nyet'.

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
jpmens, (edited ) to random
@jpmens@mastodon.social avatar

"Because of the lack of clear signals of general adoption of DNSSEC over three decades, is it time to acknowledge that DNSSEC is just not going anywhere? Is it time to call it a day for DNSSEC and just move on?"

https://blog.apnic.net/2024/05/28/calling-time-on-dnssec/

#dnssec #dns

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar
gjherbiet,
@gjherbiet@mamot.fr avatar

@jpmens @bortzmeyer @icing I also think software has matured and more and more RFCs/drafts help automating #DNSSEC (hence reducing human errors which account for a lot of outages).
To do a parallel, #HTTPS was widely adopted only when the proper protocols and tooling (ACME) to automate X.509 certificates management were reliable.
We are are only (slowly) getting there with #DNSSEC.

Tutanota, to privacy
@Tutanota@mastodon.social avatar

Protecting your doesn't stop with our world's first post-quantum email . ⚛️🔒

Tuta uses and to keep you secure. 💪

To learn more 👉👉👉 https://tuta.com/blog/tutanota-uses-dane-on-top-of-ssl-pfs

LGS, to random
@LGS@friendsofdesoto.social avatar
jpmens, to random
@jpmens@mastodon.social avatar

Yet another draft: ZONEVERSION

https://datatracker.ietf.org/doc/draft-ietf-dnsop-zoneversion/

I actually like the idea of receiving the SOA serial (zone version) in a response. Makes certain debugs easier

gjherbiet,
@gjherbiet@mamot.fr avatar

@shane_kerr @jpmens I just had the opposite train of thought: (aggressively) discard all cached entries when I know a zone has been updated (increased ZONEVERSION).
Maybe this could make the CDNs stop using dramatically low TTLs on all their records, just in case they might update their zone (or we could more comfortably use higher min-ttl values).
I also some potential to limit of outages caused by bad practice.

jpmens, to random
@jpmens@mastodon.social avatar

Forgive me, @mutax, but I just have to steal that:

the C in c.root-servers.net. stands for "caputt".

jpmens,
@jpmens@mastodon.social avatar

to be clear: if it's a issue and something's broken, then it's spelled kaputt.

bert_hubert, to random
@bert_hubert@fosstodon.org avatar

This is quite rare - the C root-servers are out of sync with the rest of the world by 3 days. Since that time there have been no changes in the root zone, except for DNSSEC signature updates. It appears all C instances (operated by ) are serving an outdated zone. For now this has no operational impact, but that might change

kubikpixel, to internet German
@kubikpixel@chaos.social avatar

»Cloudflare-Alternative:
19 Cloudflare-Alternativen im Überblick«

Hat jemensch von euch Erfahrung mit eines diesen Alternativen oder gar sogar mit einer nicht aufgeführten? Wenn ja, welches könnt ihr aus welchen Argumente und Gründen empfehlen?
(Ich zweifle immer noch welches am "sichersten" und "daten sparsam" ist)

🌐 https://letsbecrazy.de/cloudflare-alternative/


#cloudflare #internet #websicherheit #dns #webdev #dnssec #alternative #frage #it

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Point positif pour la sécurité nationale : 15 des 1031 domaines de gouv.fr sont désormais signés avec , dont celui de Dati, crucial pour la nation https://botsin.space/@DNSresolver/112438440953456482

(Notez que son copain Le Maire signe mais ne publie pas de DS pour finances.gouv.fr.)

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
jpmens, to random
@jpmens@mastodon.social avatar

Authenticated Bootstrapping in Knot DNS

"DNSSEC Bootstrapping allows the child zone operator to publish a signed copy of the child’s CDS/CDNSKEY records under a different name that has an existing chain of trust."

https://en.blog.nic.cz/2024/05/10/authenticated-dnssec-bootstrapping-in-knot-dns/

jpmens, to random
@jpmens@mastodon.social avatar

deleted_by_author

  • Loading...
  • colin,
    @colin@colincogle.name avatar

    @jpmens It’s not even signed with #DNSSEC. That’s just asking for trouble.

    antondollmaier, to random German
    @antondollmaier@mastodon.social avatar

    Montag.
    -Fehler "Server certificate not trusted." Wie vor 60 Tagen schon mal.
    Also Anruf beim Dienstleister. "da müssen wir manuell nachjustieren."
    seufz

    antondollmaier,
    @antondollmaier@mastodon.social avatar

    "Für eine permanente Lösung müssten wir auf ein Zertifikat umstellen, das manuell erneuert wird, was nicht praktikabel ist oder den TLSA-Record automatisch anpassen, was aktuell von unseren internen Policies nicht unterstützt wird. Da die Verfügbarkeit von DANE statistisch keine Auswirkung auf unseren Mailtraffic zeigt, erwägen wir auch den TLSA-Record gänzlich zu entfernen."

    Wenn das die Enthusiasten mitbekommen...

    huguei, to random

    We have new KSK for the root!
    Today a mega ceremony was held where new HSMs were introduced and a new root key was generated in them. This key will be pre-publicated at the end of this year, and the rollover will be at the end of 2026. It'll be the third in the history of the DNS. The first was in 2010 and the second in 2017.

    A TV screenshot of two HSMs
    A person holding a box with cryptographic keys inside.

    PowerDNS, to random
    @PowerDNS@fosstodon.org avatar
    gregr, to random French
    @gregr@mamot.fr avatar

    C'est le moment de sous traiter ses projets à la #startUpNation
    #dnssec a encore frappé
    Ping @bortzmeyer @shaft

    altran.com · Zonemaster
    https://zonemaster.net/fr/result/815e0e032585842e

    bortzmeyer,
    @bortzmeyer@mastodon.gougere.fr avatar
    jpmens, to random
    @jpmens@mastodon.social avatar

    deleted_by_author

  • Loading...
  • shaft,
    @shaft@piaille.fr avatar

    @jpmens Funny you mention as this website still has problems :D

    gnutls-cli --dane www.potaroo.net
    ...

    • DANE: Verification failed. The certificate differs.
      *** Fatal error: Error in the certificate.
    gregr, to random French
    @gregr@mamot.fr avatar

    QOTD :

    > Automating is still a long way from where it should be

    shaft, to random
    @shaft@piaille.fr avatar

    Here comes a new chall... Algorithm. Number 23. You will probably never use it (It's a GOST story)

    RFC 9558: Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC
    https://www.rfc-editor.org/info/rfc9558

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • kavyap
  • DreamBathrooms
  • cisconetworking
  • khanakhh
  • mdbf
  • magazineikmin
  • modclub
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • Durango
  • tacticalgear
  • JUstTest
  • ngwrru68w68
  • everett
  • normalnudes
  • cubers
  • tester
  • thenastyranch
  • osvaldo12
  • GTA5RPClips
  • ethstaker
  • megavids
  • anitta
  • Leos
  • lostlight
  • All magazines