cR0w, to random

I'm trying to make sense of something I've been seeing and hope someone here can enlighten me.

Lookalike domains are nothing new. It's been common to see something like gооgle[.]com ( note the Cyrillic 'о' characters instead of the Latin 'o' expected in google, encoded as 'xn--ggle-55da[.]com' ) to appear to be google[.]com . Lately, I've been seeing things like google[.]cоm ( note the Cyrillic 'о' in 'cоm' instead of the Latin 'o', encoded as google[.]xn--cm-fmc ).

What is the point of the lookalike TLD? It's not going to publicly resolve anywhere, right? It seems like it's likely to be a typo. If a TA was using the impersonated domain's infrastructure and mistyped the TLD, the targets won't resolve and it's game over. If the typo is from a legitimate representative of the accidentally impersonated domain, then it's just an oops. No harm, no foul.

Am I missing something here? It seems like it's simply a typo happening multiple times, but I don't want to assume just because I don't understand the potential.

to3k, to fediverse Polish
@blog.tomaszdunia.pl avatar

🇵🇱 Nowy wpis na blogu! / 🇬🇧 New blog post!

YunoHost – How to run WriteFreely instance [ENG 🇬🇧]

#a

Autor: @to3k

https://blog.tomaszdunia.pl/yunohost-writefreely-eng/

to3k, to fediverse Polish
@blog.tomaszdunia.pl avatar

🇵🇱 Nowy wpis na blogu! / 🇬🇧 New blog post!

YunoHost – jak uruchomić instancję WriteFreely

#a

Autor: @to3k

https://blog.tomaszdunia.pl/yunohost-writefreely/

shawnhooper, to random
@shawnhooper@fosstodon.org avatar

I just found out one of my domain registrars, register.to, no longer exists, due to the death of it's owner earlier this year.

https://domainnamewire.com/2023/03/02/to-registry-assures-register-to-customers-that-their-domains-are-safe/

It appears their billing system is still trying to charge customers cards though.

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Simdzone, our super fast zone file parser, will be maintained as a standalone project. We now took another step towards a releasing as part of NSD with support for makefile based builds. https://github.com/NLnetLabs/simdzone/issues/11

dnsoarc, to random
@dnsoarc@mastodns.net avatar

will be a two-day hybrid meeting, on September 6th and 7th, and co-located with the DNS Symposium in Asia.

The Programme Committee is seeking contributions from the community on all related subjects.

Submissions are due by June 10th and should include slides, with a deadline for slideset submission and rehearsal on August 8th.

Details for presentation submission are published at: https://www.dns-oarc.net/oarc41.

^RP

image/png

Decentralize_today, to random

Block trackers and ads via DNS

Android

Settings → Network & Internet → Private DNS → Private DNS provider hostname

You can use any of the DNS providers you trust. good choices:

doh.mullvad.net

dnsforge.de

dot-ch.blahdns.com

iOS, select a DNS provider you trust, perhaps AdGuard or dismail, click install profile and install it.

Settings → General → VPN and Network → DNS

and select the newly installed profile as your DNS.

Now you have encrypted , but also an ad and malware blocker.

infosec_jobs, to infosec
@infosec_jobs@mastodon.social avatar

HIRING: Cloud Support Engineer - Database Security and Authentication Management / Tokyo, Japan https://infosec-jobs.com/J29430/

adam, to linux
@adam@hax0rbana.social avatar

Is there really no that can allow or block FQDNs or domains?

iptables doesn't do it, and is just a frontend for . What else is out there for based machines?

For context: I've been around Linux since the days of ipchains. I know the model and run my own servers (primary, secondary, and resolving/caching) so there's no need to explain why this feature is non-trivial to implement

Most other OSes have this feature and it's pretty reasonable to want

jtk, to rust
jtk, to random

Internet.bs domain name registration price increase announcement:

"[...] we have faced the challenges of inflation and escalating supplier expenses. Although we have absorbed some of the price hikes from our providers in the past, our costs have continued to surge. [...] we need to modify our domain pricing."

https://internetbs.centralnicgroup.com/updated-domain-prices

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

Jeroen is working on an individual Internet-Draft "Zone file format". The document aims to remove ambiguity from the master file, or zone file, format originally specified in RFC1034 and RFC1035.

Suggestions and contributions are very welcome!
https://github.com/NLnetLabs/draft-koekkoek-dnsop-zone-file-format

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

L'association a récemment annoncé que son service de résolveur public était désormais accessible avec les protocoles de sécurité et , ce qui améliore grandement ce service. https://www.bortzmeyer.org/fdn-dot-doh.html

kas, to random

🔗 https://nat64.net/

Could be useful on IPv6-only VPSes.

/cc [ | | | | 🔖 ]

dataplane, to random
tierce, to random French

@bortzmeyer Yunohost offre des (sous)domaines en .noho.st, ynh.st ou comme le fait eu.org.

Yahoo® teste si bidule.nohost.me a un SOA si non, rejette le mail. Voir Unresolvable RFC.5321 from domain sur https://senders.yahooinc.com/smtp-error-codes/

C'est techniquement possible de mettre en place un SOA par (sous)domaine ?

cc @yunohost @ffdn

shaft, to random
@shaft@piaille.fr avatar

It's getting somewhere

$ python3 check_soa.py --nsid --ns ns1.shaftinc.fr,ns2.shaftinc.fr --tls shaftinc.fr
ns1.shaftinc.fr
51.178.53.118 [Yuggoth]: OK: 2023042101
2001:41d0:404:200::49e1 [Yuggoth]: OK: 2023042101
ns2.shaftinc.fr
136.244.112.196 [R'lyeh]: OK: 2023042101
2a05:f480:1c00:28a:5400:2ff:fee7:316f [R'lyeh]: OK: 2023042101

jtk, to fediverse
thegurkha, to random

The server you're using has a direct impact on your privacy.

https://www.howtogeek.com/874773/the-best-dns-servers-for-secure-browsing/

username, to random

Sony abusing promoting censorship over internet, attacking dns service @quad9dns

https://odysee.com/@NaomiBrockwell:4/Sony-v-internet:e

to3k, to fediverse Polish
@blog.tomaszdunia.pl avatar
quad9dns, to random
@quad9dns@mastodon.social avatar

The Danger of Content Blocking Measures by Recursive Resolvers

https://www.quad9.net/news/blog/dangers-of-content-blocking-2023

horse, to random

Awwww yah, I'm speaking @BSidesCharm again this year! But this time around I'll be joined on stage by @JimSycurity, and I could not be more psyched. We'll be talking about the unholy couple that is Active Directory and DNS.

kwf, to selfhosted
@kwf@social.afront.org avatar

It looks like https://ns-global.zone/ is serving 558 domains at the moment. I am the most amused that we are one of the authoritative DNS servers for the Internet Archive.

$ sqlite3 /var/nsg/db.sqlite "select domain from zones;" | wc -l
558

yomimono, to crossstitch

The border's not that elaborate, but it is finished!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • rosin
  • thenastyranch
  • GTA5RPClips
  • tester
  • InstantRegret
  • DreamBathrooms
  • ngwrru68w68
  • magazineikmin
  • everett
  • Youngstown
  • mdbf
  • slotface
  • kavyap
  • JUstTest
  • cisconetworking
  • khanakhh
  • normalnudes
  • osvaldo12
  • cubers
  • tacticalgear
  • Durango
  • ethstaker
  • modclub
  • anitta
  • provamag3
  • Leos
  • lostlight
  • All magazines