jabberati, to random
@jabberati@social.anoxinon.de avatar

deleted_by_author

  • Loading...
  • colincogle,

    @jabberati @debacle For what it’s worth, I use a hidden master running BIND. Hurricane Electric provides my public-facing nameservers. https://dns.he.net

    PowerDNS, to random
    @PowerDNS@fosstodon.org avatar
    becha, (edited ) to Amsterdam
    @becha@v.st avatar

    My employer is hiring! If you wish to deliver technical training courses, webinars and presentations on topics such as IPv6, #BGP, routing security #RPKI and the #RIPE Database… while working mostly from #Amsterdam … apply here … and mention me in the referral :) https://www.ripe.net/about-us/staff/careers-at-the-ripe-ncc/vacancy/290087 especially if you will also bring with you the aspects of #environmental #justice, #diversity & #inclusion, and an #activist attitude! Https://Ripe.net/jobs

    chrbre,

    @becha
    This domains has problems as there no at *.st domain
    Can help that can that?

    shaft, to ipv6 French
    @shaft@piaille.fr avatar

    arcep.fr → ,
    cyber.gouv.fr → Nada,

    Alors OK, c'est peut-être relou de déployer du DNSSEC dans gouv.fr, mais c'est censé être des cadors les zigues 🤔

    shaft, to random French
    @shaft@piaille.fr avatar

    « L'[ANSSI] annonce enfin qu'un bug bounty est en cours autour de la sécurisation de ce site. »

    https://www.nextinpact.com/lebrief/72658/le-site-web-anssi-demenage

    Je gagne combien pour signaler qu'il n'y a pas sur leur nouveau domaine, à l'heure où une nouvelle attaque () en a rappelé l'utilité ?

    https://piaille.fr/@shaft/111226674675315990

    shaft, to random French
    @shaft@piaille.fr avatar

    Ayé, fini par trouver de la config ECH faite plus sérieusement que sur nextinpact.com (ie signée avec )

    Strictement la même config par ailleurs

    https://piaille.fr/@shaft/111182482470072332

    pee, to southafrica
    @pee@mastodon.online avatar

    Does anyone know a #Hosting Provider in #SouthAfrica that can place the DS Records or DNSKEY Records with the '.co.za.' Registrant? #DNSSEC

    pee, (edited )
    @pee@mastodon.online avatar

    @uastronomer @mensrea so .ZADNA do require the Hosting Provider to submit the DS/DNS Key Record to them - they will only accept it from you, if you self-host. This to ensure the chain of trust is not broken. Really amazing service from https://www.domains.co.za - they offer out of the box and the whole process to register, transfer the domain and it being active, took less than 45 Minutes.

    shaft, (edited ) to random French
    @shaft@piaille.fr avatar

    An de grâce MMXXIII de l'ère commune, An XXXVI Anno DNS, le résolveur utilisé au boulot, résidant en 10.0.0.1, ne valide toujours pas avec 😑

    kornel, to random
    @kornel@mastodon.social avatar

    serves no purpose other than causing outages for those who try to keep the dead technology alive.

    https://blog.cloudflare.com/1-1-1-1-lookup-failures-on-october-4th-2023/

    It doesn't even matter if DNSSEC is secure, because nothing important relies on it.

    fj, (edited ) to random
    @fj@mastodon.social avatar

    I'm using 1.1.1.1 as a resolver for my home WiFi and this morning nothing was loading.

    Turns out their resolvers didn't know how to parse the new records. Some resolvers used an older cached version, which in turn failed because of the signature expired.

    DNS Integrity and Authenticity is Hard.

    https://blog.cloudflare.com/1-1-1-1-lookup-failures-on-october-4th-2023/

    pmevzek,

    @fj "Of course was to blame." That was just the consequence, and I would posit without it, the problem would even have lasted longer. The real problem as idscussed in article is a new record type in zone (ZONEMD), coupled to CloudFlare downloading the zone locally (which is fine), and parsing it... but choking on the new record type, hence keeping a stale version of the zone, with (DNSSEC) signatures starting to expire.

    jtk, to random

    The Internet Namespace Security Observatory. Nice -centric visualizations and statistics based on SecSpider data from
    Eric Osterweil. https://inso.gmu.edu/

    shaft, to random French
    @shaft@piaille.fr avatar

    Random #DNS fact of the day : 129 out of the 1465 domains in the root zone (roughly 8.8%) have a TXT record. Most of them (52, 40.6% of the records) are just : "Generation Time: <UNIX timestamp>" (eg. as. TXT)"

    Some of them are more explicit (see cg. TXT or tm. TXT)

    @afnic puts a crytpic message in its zone, surely the number of changes since last update (see fr. TXT, eg. "296 RRs processed [25/09/2023 13H10:42" please note the ugly date format "H" :P )

    shaft,
    @shaft@piaille.fr avatar

    @bortzmeyer L'avantage de les mettre en haut de l'arbre serait de profiter de : retard cryptographiquement prouvé :)

    shaft, to random
    @shaft@piaille.fr avatar

    Just noticed that the toolkit from gives a 0 TTL to NSEC3PARAM RR

    The tool I use, ldns-signzone, gives a 3600 TTL to my domain's NSEC3PARAM, which seems to follow the rule applied to NSEC/NSEC3 records ie the rule for negative response from RFC 2308 (cf. RFC 9077)

    🤔

    That is not a problem as I don't use any salt, so it won't change unless RFC 9276 recommendation is reverted.

    Was also 3600 back when I generated a new salt each time I signed the zone. Eg

    https://dnsviz.net/d/shaftinc.fr/YgWhwQ/dnssec/

    shaft, to random French
    @shaft@piaille.fr avatar

    Your random and facts of the day.

    As of today (2023-09-24):

    • 1465 TLDs in the root zone
    • 1354 are signed. That's 92.4% of all TLDs
    • 1311 are using NSEC3. That's 89.5% of all TLDs and 96.8% of all signed TLDs
    • 644 are following RFC 9276's recommended parameters. That's 43.9% of all TLDs, 47.5% of all signed TLDs and 49.1% of all signed TLDs using NSEC3
    shaft, to random
    @shaft@piaille.fr avatar

    Nice, Verisign has planned to switch from algorithm 8 to 13 for .net and .com before the end of this year.

    Change already completed for .edu a few days ago

    https://blog.verisign.com/security/dnssec-algorithm-update/

    itisiboller, to architecture
    shaft, to random French
    @shaft@piaille.fr avatar

    Oh, deployement for the root zone is scheduled tomorrow! (2023-09-21) 😯

    Count me in to spam “dig @<root-server> . ZONEMD” tomorrow 🤓

    https://lists.dns-oarc.net/pipermail/dns-operations/2023-September/022280.html

    shaft,
    @shaft@piaille.fr avatar

    I guess last time a new RR Type was introduced in the root zone was back in 2010 when all the related stuff was added (and the root zone signed) 🤔

    shaft, to random French
    @shaft@piaille.fr avatar

    Totally missed that information : a new for the root zone was generated during Root KSK Ceremony 49 last April. It's still a RSA 2048-bits key and it's keytag is 46211 if I read the log correctly

    KSK Rollover incoming ! (in 2-3 years ^^)

    https://www.iana.org/dnssec/ceremonies/49

    shaft, to random French
    @shaft@piaille.fr avatar

    Ajout du nouveau DS, suppression de l'ancien, "dig +multiline @d.nic.fr shaftinc.fr DS" fréquent, onglet DNSViz prêt...

    bortzmeyer, to random French
    @bortzmeyer@mastodon.gougere.fr avatar

    Non seulement l'Australie a été battue en rugby par les Fidji mais, cette nuit, ils ont tout cassé (DS expiré). https://dnsviz.net/d/com.au/ZQedzg/dnssec/ (C'est réparé désormais.)

    jtk, to random
    shaft, to random
    @shaft@piaille.fr avatar

    Ooh, the Ruhr uses algorithm 10 (RSA/SHA-512), that's unusual 🤔

    https://mastodns.net/@diffroot/111031272287301051

    shaft, to random
    @shaft@piaille.fr avatar

    Canada goes elliptic! 🍁 🇨🇦

    https://mastodns.net/@diffroot/111059929304792788

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • everett
  • osvaldo12
  • magazineikmin
  • thenastyranch
  • rosin
  • normalnudes
  • Youngstown
  • Durango
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • tester
  • InstantRegret
  • ethstaker
  • GTA5RPClips
  • tacticalgear
  • Leos
  • anitta
  • modclub
  • khanakhh
  • cubers
  • cisconetworking
  • provamag3
  • megavids
  • lostlight
  • All magazines