sysop408, to sysadmin
@sysop408@sfba.social avatar

Oh wow. AT&T has long been one of the networks I've dreaded running afoul of when sending email newsletters. For years they've been opaque in how their process for getting a false positive IP address de-listed from their block list.

Most networks have a form you fill out, a list of things you have to fulfill to get automatically restored, and some automatically reinstate you with a delay if you even contact them.

For years AT&T has operated under the "can neither confirm nor deny" philosophy. It has taken me weeks to a month to get a blocked IP address reinstated.

I had some email delivery issues with Gmail and needed to make some DNS changes to make Gmail happy, which instantly landed me in AT&T hell. I was expecting a month of neglect. Instead, they replied back within a few days to let me know that my request will be carried out shortly.

Thank you AT&T!

pieceofthepie, to homelab
@pieceofthepie@n8e.dev avatar

Given the issues I was having with on my I've written a post about how I made things a little better.

https://realmenweardress.es/2024/05/dockerised-vip-accessible-dns/

KazukyAkayashi, to random

Ça commence a me fatiguer la cet histoire de DNS qui fonction plus ou qu'a moitié sans aucune raison ​:blobPikaGlare:​

KazukyAkayashi,

Mais ​:nko_angry:​ comment ça peut fonctionne un coup et l'autre pas ...

Sur le OnePlus 6T (Android 11) :

Quand je passe par Rethink DNS (avec mon DNS) j'ai aucun accès a mes mails (Proton, Infomaniak, Free), Matrix mais pas de soucis pour me connecter a Iceshrimp ou Conversatin

Quand je passe le DNS direct dans la config Wi-Fi, j'ai les mail, Matrix, mais impossible de me connecter a mon instance Iceshrimp (Web ou app), Fdroid arrive pas joindre les serveurs.

Y a que Conversation qui fonction dans les deux cas en fait ...

jpmens, to random
@jpmens@mastodon.social avatar

Some people might argue that "IBDNS, the “intentionally broken” DNS server" isn't necessary. 😜

https://www.afnic.fr/en/observatory-and-resources/news/afnic-launches-ibdns-the-intentionally-broken-dns-server/

jpmens, (edited ) to random
@jpmens@mastodon.social avatar

"Because of the lack of clear signals of general adoption of DNSSEC over three decades, is it time to acknowledge that DNSSEC is just not going anywhere? Is it time to call it a day for DNSSEC and just move on?"

https://blog.apnic.net/2024/05/28/calling-time-on-dnssec/

#dnssec #dns

gjherbiet,
@gjherbiet@mamot.fr avatar

@jpmens @bortzmeyer @icing I appreciate Geoff positions because they deliberately shake things and force you to reconsider accepted situations.
This article is in fact a follow-up from last year (https://blog.apnic.net/2023/02/20/opinion-to-dnssec-or-not/).
What is strange is that he also advocates for resolverless (DoH push + RFC7901) (https://blog.apnic.net/2022/05/17/the-path-to-resolverless-dns/) which more or less requires DNSSEC for the client to validate and trust records pushed from the (web) server.

ligaturerecords, to random French
@ligaturerecords@mamot.fr avatar

dites les geeks éthiques du c'est qui le registrar cool à la mode sympa et gentil panda du moment ?

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We plan to implement #JSON output in our #DNS investigation tool dnsi. There is informational RFC 8427 for representing DNS messages in JSON, but we’d like to see if there is a more ergonomic way of representing such a format. We'd love to hear about your use cases and wishes. https://github.com/NLnetLabs/dnsi/issues/12

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Le on-va-tous-mourir du jour https://dnsbomb.net/

On a le droit de pomper Dragon Ball Z comme ça ?

LGS, to random
@LGS@friendsofdesoto.social avatar
R1Rail, to random French
@R1Rail@mastodon.gougere.fr avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Bonjour, Lyon ! Il paraît que c'est https://jdll.org/

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar

Délégation des noms de domaine. Les registres ont des règles d'enregistrement, parfois différentes. Ainsi, .coop est réservé aux coopératives et alliés.

mmu_man, to random French
@mmu_man@m.g3l.org avatar

Et là y a la conf de @bortzmeyer qui du coup ne peut pas s'auto-pouetter en directe laïve…

Trouver de l'information sur un nom de domaine

https://pretalx.jdll.org/jdll2024/talk/QEBGGK/

#JDLL #JDLL2024 #DNS

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

C'est pendant les pannes qu'on peut le mieux observer comment un système marche. Les perturbations qui affectent le serveur racine du identifié par la lettre C sont donc l'occasion d'apprendre comment fonctionne ce système des serveurs racine.

https://www.bortzmeyer.org/c-root-retard.html

jpmens, to random
@jpmens@mastodon.social avatar

Yet another draft: ZONEVERSION

https://datatracker.ietf.org/doc/draft-ietf-dnsop-zoneversion/

I actually like the idea of receiving the SOA serial (zone version) in a response. Makes certain debugs easier

gjherbiet,
@gjherbiet@mamot.fr avatar

@shane_kerr @jpmens I just had the opposite train of thought: (aggressively) discard all cached entries when I know a zone has been updated (increased ZONEVERSION).
Maybe this could make the CDNs stop using dramatically low TTLs on all their records, just in case they might update their zone (or we could more comfortably use higher min-ttl values).
I also some potential to limit of outages caused by bad practice.

br00t4c, to random
@br00t4c@mastodon.social avatar

DNS glitch that threatened Internet stability fixed; cause remains unclear

https://arstechnica.com/?p=2026566

shaft, to random French
@shaft@piaille.fr avatar

Quelques changements sur mon petit script 'check_soa' :

  • Passage de 2 versions (mono/multi-thread) à une seule (le multithread devenant une option)
  • Sortie JSON d'un peu (euphémisme) meilleure qualité

https://framagit.org/Shaft/check-soa

wloczykij, to random Polish

Są tu spece od Dockera? Próbuję uruchomić kontener Dockera używają Podmana (https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md), ale utknąłem. Po wielu próbach, kombinowaniu, aktualizacji setek programów, utknąłem na niemożności uruchomienia kontenera, bo twierdzi, że port 53/tcp jest w użyciu. Zrobiłęm już chyba wszystko, co mi wpadło do głowy, czyli wyłączenie systemd, wyłączenie nasłuchiwania przez systemd na porcie 53 i nic to nie daje. Co ciekawe, netstat nie pokazuje portu 53 jakoby był w użyciu, więc nie wiem nawet, jaki program może tego używać. Co ciekawe, jak wziąłem nmapa z innego hosta, to pokazuje, ze port 53 jest zamkniety, wiec cos tam nasluchuje, ale nie wiem co.
Podobno podman używa jakiegoś własnego serwera DNS do zarządzania siecią między kontenerami, ale nie ogarniam tego, a i nie wiem, czy tu może być problem. Poza tym serwerem podmana, nie przychodzi mi juz nic do glowy.

Macie jakiś pomysł, jak to rozwiązać?










jpmens, to random
@jpmens@mastodon.social avatar

Forgive me, @mutax, but I just have to steal that:

the C in c.root-servers.net. stands for "caputt".

oli, to random German
@oli@mastodns.net avatar

apparenty has a different meaning today... @diffroot

becha, to sustainability
@becha@v.st avatar

Listening to talk by AFNIC @afnic at about (reducing) the energy consumption of services - thanks Sandoche for bringing the topics of to @ripencc

Tutanota, to security
@Tutanota@mastodon.social avatar

We love #DNS! ❤️

Tuta uses DMARC, DKIM & SPF to protect your domains from spoofing. Unlimited custom domain aliases & strong #security are a perfect match. 🔒

Not sure what these acronyms mean? No worries, we've got you covered.

👉 https://tuta.com/blog/dkim-custom-email-domain

kubikpixel, to internet German
@kubikpixel@chaos.social avatar

»Cloudflare-Alternative:
19 Cloudflare-Alternativen im Überblick«

Hat jemensch von euch Erfahrung mit eines diesen Alternativen oder gar sogar mit einer nicht aufgeführten? Wenn ja, welches könnt ihr aus welchen Argumente und Gründen empfehlen?
(Ich zweifle immer noch welches am "sichersten" und "daten sparsam" ist)

🌐 https://letsbecrazy.de/cloudflare-alternative/


  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines