jpmens, to medical
@jpmens@mastodon.social avatar

“I have been procrastinating this migration for years”

It’s almost as though I dictated portions of this blog. Thank you, @fanf for writing it!

https://dotat.at/@/2024-05-11-dnssec-policy.html

shaft, to random French
@shaft@piaille.fr avatar

Tiens, ne met pas le bit AA pour les réponses venant d'une (j'ai peut-être loupé une option). Il indique le SOA de la RPZ dans la section additionnelle de la réponse ceci dit

gyptazy, to security
@gyptazy@gyptazy.ch avatar

To all who are hosting their own server with - what do you use in 2024?

or -P256 or still on some algorithms? Shorter key length is especially in DNS a benefit but still not all resolvers may be able to support this in 2024?!

itnewsbot, to homelab
@itnewsbot@schleuss.online avatar

Doing DNS and DHCP for your LAN the old way—the way that works - Enlarge / All shall tremble before your fully functional forward and re... - https://arstechnica.com/?p=2001156

geekymalcolm, to random
@geekymalcolm@ioc.exchange avatar
SharonCummingsArt, to Red
@SharonCummingsArt@mastodon.social avatar
SharonCummingsArt, to Red
@SharonCummingsArt@socel.net avatar
MarjoleinRotsteeg, to Haiku Dutch
@MarjoleinRotsteeg@mastodon.nl avatar
juma, to Haiku
@juma@mas.to avatar

pardon, do you mind
over here they’re in a bind
be kind, please, be kind


@stevencudahy

SuitedUpDev, to RedHat
@SuitedUpDev@mastodon.online avatar

Can I ask the people in the audience a question ?

Given the following version "9.11.4-P2-RedHat-9.11.4-16.P2.el8" string is there a way too see if this is a or version ?

zeroiee, to sysadmin
@zeroiee@techhub.social avatar

At ZERO GmbH, we're managing a lot of Nodes (see: https://zero-iee.com/en/products/). Most of them are connected to our management VPN. Each of the nodes has a unique identifier (serial no.).

We've set up an internal DNS server that resolves their serial bumber-based FQDN and returns the corresponding VPN IP address. Thus it's easy to find the correct VPN and IP address to start maintenance or troubleshooting :-)

Our requirements on a DNS Server are quite low. We could have picked THE ONE, the only, the allmighty Bind DNS server - but instead we tried something different:

Yadifa. https://www.yadifa.eu
Yadifa is a less-known DNS server implementation by EURid - the nonprofit organization that powers the .eu top level domain!

We were surprised of the simplicity of Yadifa and had our DNS Server up and running in minutes! If you're looking for an easy to configure DNS server, check it out.

shaft, to random
@shaft@piaille.fr avatar

Just noticed that the toolkit from gives a 0 TTL to NSEC3PARAM RR

The tool I use, ldns-signzone, gives a 3600 TTL to my domain's NSEC3PARAM, which seems to follow the rule applied to NSEC/NSEC3 records ie the rule for negative response from RFC 2308 (cf. RFC 9077)

🤔

That is not a problem as I don't use any salt, so it won't change unless RFC 9276 recommendation is reverted.

Was also 3600 back when I generated a new salt each time I signed the zone. Eg

https://dnsviz.net/d/shaftinc.fr/YgWhwQ/dnssec/

circl, to infosec
@circl@social.circl.lu avatar

ISC has disclosed two vulnerabilities in BIND 9 (CVE-2023-3341, CVE-2023-4236)

https://www.openwall.com/lists/oss-security/2023/09/20/2

itisiboller, to architecture
iscdotorg, to random
@iscdotorg@fosstodon.org avatar

New BIND 9 versions are published!

Today we have released updates in our two stable branches (9.8.19 and 9.16.44) and one development branch (9.19.17).

These include public disclosure and patches for two CVEs:

https://kb.isc.org/docs/cve-2023-3341

and

https://kb.isc.org/docs/cve-2023-4236

Download the software and release notes at https://www.isc.org/download/#BIND

Thank you for using ISC's software!

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Sinon, si vous vous ennuyez, il y a une alerte de sécurité sur , des nouvelles versions viennent d'être publiées, et il faut mettre à jour.

vwbusguy, to Ansible
@vwbusguy@mastodon.online avatar

It seems that most people who manage with have given up on the RFC recommendation for SOA serials YYYYMMDDxx and just use epoch time, which means that since it's a 32-bit unsigned value per RFC1035, there are going to be a lot of problems for domain names that are still operating in the year 2106.

vwbusguy, (edited )
@vwbusguy@mastodon.online avatar

In case anyone else needs it, here's a quick bash script I wrote to calculate the new serial for zones. At the moment, it only supports one zone per file, but I can update it to grok more than one fairly easily if it would be helpful for anyone. In case the serial has been holding you up from automating your entries:

https://gist.github.com/vwbusguy/bbfa09bbe78788f476a8feb200efe450

Now you can automate serial into the year 9999!

travis, to linux
@travis@nodespace.social avatar

Any admins with more experience than me know of a way to sync up ACLs on secondary servers?

antondollmaier, to random
@antondollmaier@mastodon.social avatar

I have access to a nameserver via rndc and directly to the zone files.
Is there a way to get a list of all records in a zone? "grep" works, but with active DNSSEC, it doesn't give me just the names for future processing?
For PowerDNS, I can SELECT directly in the SQL database - but with bind?

securityaffairs, to retrogaming Italian
YesIKnowIT, to linux
@YesIKnowIT@mastodon.social avatar

Simple and clear article by Nick Congleton about cleaning the DNS cache, whether you're using dnsmask, bind, systemd-resolve or nscd.

https://www.maketecheasier.com/flush-dns-cache-linux/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • thenastyranch
  • osvaldo12
  • Durango
  • ngwrru68w68
  • khanakhh
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • Youngstown
  • everett
  • InstantRegret
  • slotface
  • rosin
  • provamag3
  • kavyap
  • tacticalgear
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ethstaker
  • normalnudes
  • modclub
  • tester
  • anitta
  • Leos
  • megavids
  • lostlight
  • All magazines