kubikpixel, to internet German
@kubikpixel@chaos.social avatar

»Cloudflare-Alternative:
19 Cloudflare-Alternativen im Überblick«

Hat jemensch von euch Erfahrung mit eines diesen Alternativen oder gar sogar mit einer nicht aufgeführten? Wenn ja, welches könnt ihr aus welchen Argumente und Gründen empfehlen?
(Ich zweifle immer noch welches am "sichersten" und "daten sparsam" ist)

🌐 https://letsbecrazy.de/cloudflare-alternative/


PowerDNS, to random
@PowerDNS@fosstodon.org avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Point positif pour la sécurité nationale : 15 des 1031 domaines de gouv.fr sont désormais signés avec , dont celui de Dati, crucial pour la nation https://botsin.space/@DNSresolver/112438440953456482

(Notez que son copain Le Maire signe mais ne publie pas de DS pour finances.gouv.fr.)

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
jpmens, to medical
@jpmens@mastodon.social avatar

“I have been procrastinating this migration for years”

It’s almost as though I dictated portions of this blog. Thank you, @fanf for writing it!

https://dotat.at/@/2024-05-11-dnssec-policy.html

jpmens, to random
@jpmens@mastodon.social avatar

Authenticated Bootstrapping in Knot DNS

"DNSSEC Bootstrapping allows the child zone operator to publish a signed copy of the child’s CDS/CDNSKEY records under a different name that has an existing chain of trust."

https://en.blog.nic.cz/2024/05/10/authenticated-dnssec-bootstrapping-in-knot-dns/

jpmens, to random
@jpmens@mastodon.social avatar

It's in the DNS. Of course.

colin,
@colin@colincogle.name avatar

@jpmens It’s not even signed with . That’s just asking for trouble.

antondollmaier, to random German
@antondollmaier@mastodon.social avatar

Montag.
#DANE-Fehler "Server certificate not trusted." Wie vor 60 Tagen schon mal.
Also Anruf beim Dienstleister. "da müssen wir manuell nachjustieren."
seufz

antondollmaier,
@antondollmaier@mastodon.social avatar

"Für eine permanente Lösung müssten wir auf ein Zertifikat umstellen, das manuell erneuert wird, was nicht praktikabel ist oder den TLSA-Record automatisch anpassen, was aktuell von unseren internen Policies nicht unterstützt wird. Da die Verfügbarkeit von DANE statistisch keine Auswirkung auf unseren Mailtraffic zeigt, erwägen wir auch den TLSA-Record gänzlich zu entfernen."

Wenn das die Enthusiasten mitbekommen...

huguei, to random
@huguei@mastodns.net avatar

We have new KSK for the root!
Today a mega ceremony was held where new HSMs were introduced and a new root key was generated in them. This key will be pre-publicated at the end of this year, and the rollover will be at the end of 2026. It'll be the third in the history of the DNS. The first was in 2010 and the second in 2017.

A TV screenshot of two HSMs
A person holding a box with cryptographic keys inside.

jpmens, (edited ) to random
@jpmens@mastodon.social avatar

PSA: diy keyrollovers might lack automation.

#dnssec #sorry

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
gregr, to random French
@gregr@mamot.fr avatar

C'est le moment de sous traiter ses projets à la #startUpNation
#dnssec a encore frappé
Ping @bortzmeyer @shaft

altran.com · Zonemaster
https://zonemaster.net/fr/result/815e0e032585842e

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar
jpmens, to random
@jpmens@mastodon.social avatar

deleted_by_author

  • Loading...
  • shaft,
    @shaft@piaille.fr avatar

    @jpmens Funny you mention as this website still has problems :D

    gnutls-cli --dane www.potaroo.net
    ...

    • DANE: Verification failed. The certificate differs.
      *** Fatal error: Error in the certificate.
    gregr, to random French
    @gregr@mamot.fr avatar

    QOTD :

    > Automating is still a long way from where it should be

    shaft, to random
    @shaft@piaille.fr avatar

    Here comes a new chall... Algorithm. Number 23. You will probably never use it (It's a GOST story)

    RFC 9558: Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC
    https://www.rfc-editor.org/info/rfc9558

    mtxvp, to internet
    @mtxvp@mastodon.social avatar

    Root KSK Ceremony - the most meticulous security procedure on the internet https://www.cloudflare.com/dns/dnssec/root-signing-ceremony/

    shaft, (edited ) to random French
    @shaft@piaille.fr avatar

    Generating #DNSSEC signatures using the private keys from #RFC 9500 (a bunch a publicly known private keys, which is a strange concept 🤔) : it works nicely. :3 The keytag for "testECCP256" is 56715 or 56716 (whether it's a ZSK or a KSK).

    The RFC lacks ed25519 and ed448 keys though

    shaft, to random French
    @shaft@piaille.fr avatar

    Heureusement, je ne serais sans doute plus là, un peu avant 2106, quand il faudra commencer à se faire des nœuds au cerveau avec l'arithmétique des numéros de série du RFC 1982 appliquée au champs de dates des signatures

    La mortalité a du bon.

    PowerDNS, to random
    @PowerDNS@fosstodon.org avatar
    shaft, to random French
    @shaft@piaille.fr avatar

    Il y a une vingtaine d'années, l' @afnic avait mis en ligne une auto-formation au #DNS, avec un design très CD-ROM interactif typique de la fin 90's / début du siècle :)

    Il y a même du #DNSSEC dans la partie avancée : c'est l'époque des KEY, SIG et autre NXT du DNSSEC 1ère génération

    https://web.archive.org/web/20081128073423/https://www.afnic.fr/ext/dns/

    shaft, to random
    @shaft@piaille.fr avatar

    OK, draft-rfc8624-bis says:

    “This document simply moves the canonical list of algorithms from [RFC8624] to the IANA registry, and defines the registry policies for updating the registry. It does not change the status of any of the algorithms listed in [RFC8624];”

    Now, in the table in section 3, column " Signing", algorithms 5 & 7 are listed as "MUST NOT". They are "NOT RECOMMANDED" in RFC 8624 section 3.1. The recommandation for validation also changes (from "MUST" to "SHOULD NOT")

    It is slightly different (for the better imo but still) :)

    https://datatracker.ietf.org/doc/draft-hardaker-dnsop-rfc8624-bis/

    https://www.rfc-editor.org/rfc/rfc8624.html

    bortzmeyer, to random French
    @bortzmeyer@mastodon.gougere.fr avatar

    Last working group meeting of , the second meetng of dnsop (all things )

    https://datatracker.ietf.org/meeting/119/materials/agenda-119-dnsop-02

    bortzmeyer,
    @bortzmeyer@mastodon.gougere.fr avatar

    Analysis of existing CDS/CDNSKEY records in the wild. They are sometimes broken, sometimes in funny ways (authortative name servers not returning the samed CDS...)

    Why would a domain in .com publish a CDS (.com does not handle CDS) and a broken one (does not match the keys)?

    #DNS #DNSSEC #IETF119

    bortzmeyer, to random French
    @bortzmeyer@mastodon.gougere.fr avatar
    bortzmeyer,
    @bortzmeyer@mastodon.gougere.fr avatar

    draft-ietf-dnsop-compact-denial-of-existence
    Formerly "black lies". For dynamic signers.

    No RFC standardize the reply to metatypes (like NXNAME). Most return FORMERR, PowerDNS returns SERVFAIL.

    But biggest issue, IMHO, should we require NXDOMAIN for non-DNSSEC clients? (NS1 returns NOERROR in any case.)

    (Tested at the hackathon https://github.com/IETF-Hackathon/ietf119-project-presentations/blob/main/ietf-119-hackathon-DNS.pdf )

    bortzmeyer, to random French
    @bortzmeyer@mastodon.gougere.fr avatar

    Good morning, Brisbane! Second day of the hackathon.
    Let's add more bugs to the code written yetesrday. https://wiki.ietf.org/en/meeting/119/hackathon

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • rosin
  • modclub
  • Youngstown
  • khanakhh
  • Durango
  • slotface
  • mdbf
  • cubers
  • GTA5RPClips
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • megavids
  • magazineikmin
  • osvaldo12
  • tester
  • tacticalgear
  • ethstaker
  • Leos
  • thenastyranch
  • everett
  • normalnudes
  • anitta
  • provamag3
  • cisconetworking
  • lostlight
  • All magazines