quad9dns, to random

We’re happy to see more well-considered, multi-stakeholder comments on how resolvers should approach technical and policy questions.

Resolver Recommendations from @ripencc https://www.ripe.net/publications/docs/ripe-823/

shaft, to random French
@shaft@piaille.fr avatar

Je pars en vacances et bim, une nouvelle option #EDNS. Pour remonter des erreurs.

#RFC 9567: #DNS Error Reporting
https://www.rfc-editor.org/info/rfc9567

nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

We’re pleased to announce the release of version 0.10.0 of “domain”, our crate for interacting with the . This release results from the first three months of increased focus on the library, with three full-time developers and a one-year commitment from @sovtechfund.

We included three major new features: the client side of sending DNS messages, its server counterpart, and the machinery for representing DNS zones. Read all about it in this post. https://nlnetlabs.nl/news/2024/Apr/29/domain-0.10.0-released/

sb, to debian
@sb@fed.sbcloud.cc avatar

I hooked my GNU/Linux-loving son up with an old #lenovo #thinkcenter mini-PC that I picked up at a used AV store for about $50. For another $20, I upgraded the ram to 12GB.

He's got it setup it up with #debian as his first home server, with which he's now hosting a few static websites and an internet radio station for his friends and family. He's got loads of resources to spare for when he gets into running larger services.

You don't need to spend $30+ a month on cloud services when an old recycled office PC will more than suffice.

The best part? Helping him troubleshoot his problems with #DNS and #nginx and all that fun stuff. I've already made every mistake possible over the decades, and he gets to benefit from that. That how it should work!

#gnuLinux #selfhosting #disenshittify #eff

quad9dns, to privacy

EXCITING NEWS! Quad9 Announces Advisory Council to Consider Human Rights Impacts => Read more about how we offer a more safe and robust Internet for everyone: https://www.quad9.net/news/press/quad9-announces-advisory-council-to-consider-human-rights-impacts

#DNS #privacy #security #humanrights

luca, to random

questo e' un pippone supertecnico per sistemisti informatici e basta ok ?

Fino a ieri avevo, da contratto, con un provider, un ip fisso, sempre quello per 10 anni.

Sulla base di questo ho preso la decisione, probabilmente sbagliata, di mettere l'istanza di casa direttamente sul nome a dominio (per fare nome presso cognome).

quindi nel dns ho

sironi.tk. A l'indirizzo ip
http://sironi.tki.tk](http://sironi.tk)
altraroba CNAME sironi.tk

nginx a seconda che riceva una richiesta per sironi,tk, www.sironi.tk o altraroba.sironi.tk punta al servizio interno corrispondente

Il provider nuovo, gia' in funzione, non mi consente di avere un ip fisso, ma, mentre per i sottodomini, e' facile farli puntare con un cname a un dyndns qualsiasi, il dominio principale deve essere sempre indicato con un record A e un indirizzo ip.

Cambiare dominio activitypub senza perdere lo storico non si puo'.

In sostanza mi servirebbe migrare il dns del dominio su un gestore che permetta l'aggiornamento automatico (con un client tipo quelli dei dyndns) del record A

any idea ? aws lo fa ?

jmhorner, to random
@jmhorner@eattherich.club avatar

Huzzah! dnscrypt.ca is back on the public resolver list. #DNS #DNSCrypt #DoH #DoT

https://github.com/DNSCrypt/dnscrypt-resolvers/issues/892

elfin, to sysadmin
@elfin@mstdn.social avatar

So, it's technically my typo, but it's in the zone file, so I still get to blame ... right?

rysiek, to random
@rysiek@mstdn.social avatar

If #DNS is so great, why is there a .int, but not a .float, .char, or .double? 🤔

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

RFC 9567: DNS Error Reporting

Ce nouveau propose un système pour permettre aux résolveurs de prévenir les serveurs faisant autorité qu'il y a un problème dans leur zone.

https://www.bortzmeyer.org/9567.html

huguei, to random

We have new KSK for the root!
Today a mega ceremony was held where new HSMs were introduced and a new root key was generated in them. This key will be pre-publicated at the end of this year, and the rollover will be at the end of 2026. It'll be the third in the history of the DNS. The first was in 2010 and the second in 2017. #dns #dnssec

A TV screenshot of two HSMs
A person holding a box with cryptographic keys inside.

linuxmagazine, to security
@linuxmagazine@fosstodon.org avatar

Hunting and Gathering: Chris Binnie looks at passive reconnaissance tools attackers use for preliminary research on network assets and the people who use them https://www.linux-magazine.com/Issues/2024/279/Passive-Reconnaissance

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

OK, another talk (no longer at #WAC), on communication infrastructure power and ideology by Niels Ten Oever.

#infraPower

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar

Example: implementation of European Internet sanctions against Russia. DId it work?

#infraPower #DNS

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

The pre-release of NSD 4.10.0 is now available. This version of our authoritative server dramatically speeds up zone loading and IXFRs, up to almost four times faster than the previous implementation! 🏎️

Please test out this Release Candidate on every kind of architecture and operating system you can find to help us iron out the corner cases we haven’t found ourselves yet. 💚🙏 https://lists.nlnetlabs.nl/pipermail/nsd-users/2024-April/003302.html

avernois, to hosting

I'm looking to move all my personnal web stuff (domain names, dns, server, e-mail) out of Gandi.

Any suggestions for a better replacement in France or Europe ?

(for historical, personnal reasons, I'd like to avoid ovh)

#hosting #dns #vps

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Our new SIMD-capable zonefile parser is now part of the NSD main branch as a submodule. We'll finish the latest tests today and then make it available as a pre-release to allow you to test the speed improvements. We're curious to hear how this performs in your systems! https://github.com/NLnetLabs/nsd/pull/328

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
dnsoarc, to statistics
@dnsoarc@mastodns.net avatar

#dsc v2.15.1 released!
Fixed client subnet indexer which overwrote the mask options during initialization, conf client_v4_mask andclient_v6_mask now works as intended
^JL
#DNS #Statistics #OpenSource #OARC
https://github.com/DNS-OARC/dsc/releases/tag/v2.15.1

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Software author: NEVER NEVER NEVER use a dummy, non-existing domain in the default configuration, it may exist one day! https://crapts.org/2024/04/21/all-fritz-box-modems-have-been-hijacked/

#DNS

marcel, to internet
@marcel@waldvogel.family avatar

Anybody knows where to get good Internet traffic statistics these days? I'm interested in the protocol mix seen in the backbone, not absolute numbers.

What percentage of the traffi is , , , , , , , , … these days?

had some traces, but the latest I know are from 2012, which is not helpful.

Taffer, to macos
@Taffer@mastodon.gamedev.place avatar

Why yes, I would love to restart my work laptop because macOS has forgotten how to DNS again, and I can't seem to reset it without a reboot.

With that last detail, I'm going to blame it no the various filters, DNS blockers, etc. provided by IT. At least one of them looked dead (or in distress) this morning.

I wouldn't hate these things so much if they didn't impact productivity so severely. Literally four, just for the network.

#macos #dns #it

shaft, to random French
@shaft@piaille.fr avatar

Je fais du #DNS donc je m'y connais en autorité. Sur le sujet, je confirme qu'Attal est bien d'extrême-droite

jmhorner, to random
@jmhorner@eattherich.club avatar

Yeah, you heard me. I am testing out a new server for https://dnscrypt.ca/ and it is ready for users to test. No-logs DNS service returns!
#DNS #DNSCrypt #DoT #DoH #digitalprivacy

changelog, to infosec
@changelog@changelog.social avatar

The one where Paul Vixie tells the tale of Dam Kaminsky's most impressive DNS hack 🤯

🎥 https://youtu.be/sSDVc9538Cw

#infosec #dns #video

shaft, to random
@shaft@piaille.fr avatar

More straws on the #DNS camel: another #IETF draft to amend RFC 1035. :)

"4. Updates to RFC 1035
A DNS message with OPCODE = 0 (QUERY) MUST NOT include a QDCOUNT parameter whose value is greater than 1. It follows that the Question Section of a DNS message with OPCODE = 0 MUST NOT contain more than one question.

A DNS message with OPCODE = 0 (QUERY) and QDCOUNT > 1 MUST be treated as an incorrectly-formatted message. The value of the RCODE parameter in the response message MUST be set to 1 (FORMERR)."

"In the DNS, QDCOUNT is (usually) One"
https://datatracker.ietf.org/doc/draft-ietf-dnsop-qdcount-is-one/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines