shaft, to random
@shaft@piaille.fr avatar

And v3 of Terminology has been published as 9499 \o/

(v2 was 8499 and v1 7719. I hope v4 will be 9999)

3 versions in 5 years :') (7719 was published in January 2019)

https://www.rfc-editor.org/info/rfc9499

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

My experimental authoritative name server deployed on the IETF network for the #IETF119 hackathon receives requests for sl/ANY (it rejects them).
I was wondering why someone is interested in Sierra Leone but it turns out its authoritative name servers accept QTYPE=ANY and return > 5 kB of data, with several keys, signatures and even NSEC records to prove that they have returned everything they know.

#DNS

train, to ipv6

Damn you just keep coming back up in the !! Can we make a ipv5.5432 or something that I can wrap my head around this shit easier! It's the adkjlfa;dljfklad:adlkjfal;dkfja:a;lkdjlfkjfjd:123:1233435:3434:22123233 that throws me off. Then here comes them network heads be like.. You dummy the fuck wrong with you that's easy as shit to see.. It's the 3rd semicolon from the back.. you ass hat.. ummm what! 😐

I just want a static ip gawd damit 🤣..

gbraad, to random
@gbraad@mastodon.social avatar

localhost always resolves

#dns

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We're implementing fast_reload in Unbound resolver. It works by creating a thread that reads the configuration and allocates memory. Then, it quickly halts the other threads, updates the config and swaps the trees of forwards and stubs in place, and continues the other threads. A test with thousands of forwards has a reload time of 0.027s with 0.0003s spent in halting the other threads. https://github.com/NLnetLabs/unbound/pull/1015

foss_android, to android
@foss_android@mstdn.social avatar

Rethink
DNS + Firewall + VPN

is a security app that combines multiple functionalities to protect your device.

Download: https://rethinkdns.com/download

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Good morning, Brisbane! Second day of

Today, DELEG (changing the delegation system of the ), GAIA (Internet access for all, MIMI (making instant messaging interoperable).

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

C'est exotique, un client au Vanuatu (adresse en vodafone.com.vu) nous signale un problème #DNS sur .fr. Au boulot pour déboguer cela.

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar
kuketzblog, to security German
@kuketzblog@social.tchncs.de avatar

Das geplante Tutorial zu für das erste Quartal 2024 ist auf unbestimmte Zeit verschoben. Auch Version 0.5.5c ist mir persönlich noch zu buggy bzw. es treten seltsame Situationen/Schwierigkeiten im Betrieb auf. Da muss noch etwas Fleiß und Arbeit reinfließen, bevor ich dazu ein Tutorial erstelle.

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Good morning, Brisbane! Second day of the hackathon.
Let's add more bugs to the code written yetesrday. https://wiki.ietf.org/en/meeting/119/hackathon

oli, to random
@oli@mastodns.net avatar

Is it just me or is Powershell's "Resolve-Dnsname" even worse than nslookup?

"Resolve-Dnsname -NoHostsFile -NoRecursion -DnsOnly -Server a.root-servers.net -Name com." ✅

same for "-Name net." ✅

but for "-Name org." (or any other TLD):

  • CategoryInfo : ResourceUnavailable: (org.:String) [Resolve-DnsName], Win32Exception
  • FullyQualifiedErrorId : RCODE_SERVER_FAILURE,Microsoft.DnsClient.Commands.ResolveDnsName

WAT?

#DNS

shaft, to random
@shaft@piaille.fr avatar

Anyone from #RIPENCC around here? #DANE validation is broken for www.ripe.net :/

$ gnutls-cli --dane www.ripe.net:443
...

  • Status: The certificate is trusted.
  • DANE: Verification failed. CA constrains were violated.

(Remember that #DNS is innocent)

#DNSSEC

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We're happy to introduce Unbound 1.9.3. This a bug fix release of our resolver, fixing a smörgåsbord of small issues. https://nlnetlabs.nl/news/2024/Mar/14/unbound-1.19.3-released/

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Since last November, we've been quite busy with security releases for Unbound. Now, with this latest bug fix release out the door, our aim is to get some features released we've been preparing, such as DNS-over-QUIC and upstream cookies. 🍪🍪 https://github.com/NLnetLabs/unbound/milestone/3

shaft, to random French
@shaft@piaille.fr avatar

Je viens juste de me rendre compte que #TCPFastOpen n'était pas activé sur mes 2 serveurs faisant autorité acceptant les requêtes via #TLS (chiffrement opportuniste, les certificats sont auto-signés — mais vérifiables via #DANE/TLS). J'étais donc en (léger) froid avec la section 4.1 du RFC 9210 (aka BCP 235) :

#DNS servers SHOULD enable TFO wheb possible”

Sachant que là, c'était possible.

iscdotorg, to random
@iscdotorg@fosstodon.org avatar

Spread the news: BIND 9.16 is approaching its End of Life (EOL). April 2024 will be the last release for the 9.16 branch. Users are encouraged to migrate to 9.18.

Find out more at https://www.isc.org/blogs/2024-bind-9.16-eol/

PowerDNS, to random
@PowerDNS@fosstodon.org avatar

PowerDNS Recursor: Extended DNS Errors Help You Troubleshooting
https://blog.powerdns.com/2024/03/12/powerdns-recursor-ede-helps-troubleshooting #dns

badnetmask, to homelab
@badnetmask@hachyderm.io avatar

On this episode of "managing your the same way you manage your day job": I've been discussing with my wife an appropriate change window to migrate our home server. She's my Change Advisory Board. 🤣

happyborg, to SafeNetwork
@happyborg@fosstodon.org avatar
larsmb, to random
@larsmb@mastodon.online avatar

Hrm. Do wildcard DNS records not work for the AAAA type? 🤔

#dns

gyptazy, to security
@gyptazy@gyptazy.ch avatar

To all who are hosting their own server with - what do you use in 2024?

or -P256 or still on some algorithms? Shorter key length is especially in DNS a benefit but still not all resolvers may be able to support this in 2024?!

moritz, to random

If you have #DNS research in an early stage and would like some feedback, please consider submitting a one page-abstract to the DINR workshop
https://ant.isi.edu/events/dinr2024/
Deadline will be extended until 7 March

shaft, (edited ) to random French
@shaft@piaille.fr avatar

Ooooh, Recursor allows to add when using Response Policy Zones (or ). Neat :3

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines