bert_hubert, to random
@bert_hubert@fosstodon.org avatar

This is quite rare - the C root-servers are out of sync with the rest of the world by 3 days. Since that time there have been no changes in the root zone, except for DNSSEC signature updates. It appears all C instances (operated by #cogent) are serving an outdated zone. For now this has no operational impact, but that might change #DNSSEC

michal, to ipv6

More details about the end of #IPv4 in state services: On 18th of December 2013 Czech #government decided that every service provided by Czech state has to be available on #IPv6 and be protected by #DNSSEC by 30th of June 2015. Yesterday a followed up action has been agreed on. On 6th of June 2032, IPv4 will be disabled on all services offered by Czech republic and they will be only available on IPv6 from that day on. Apart from that, every June starting from 2025, Czech government will get a report on how are the preparations.

Overall seems like a bold move, but I totally support it! IT sends a message, that #IPv4 is over and everybody should move to #IPv6 already. And even government - the definition of conservative and bureaucratic institution - gets it. Then why shouldn't you embrace it 😉

More information in Czech:
https://blog.nic.cz/2024/01/18/kratke-vlny-vladni-restart-podpory-ipv6/
https://blog.nic.cz/2024/01/18/odvazny-krok-ceske-vlady/

todb, to random

I, humbly, consider myself pretty conversant in the basics of (modern and classical) cryptography and information security.

For most of my career, I've been mystified as to what problem purports to solve.

Has there ever been a case of a DNS-based attack (spoofing, hijacking, transfer, DDoS, etc) that's been thwarted by DNSSEC? Or, in the reverse, has there been an attack that was successful that DNSSEC would have solved?

I don't know what it is, but the upsides of DNSSEC just hasn't clicked in my brain.

huguei, to random

We have new KSK for the root!
Today a mega ceremony was held where new HSMs were introduced and a new root key was generated in them. This key will be pre-publicated at the end of this year, and the rollover will be at the end of 2026. It'll be the third in the history of the DNS. The first was in 2010 and the second in 2017. #dns #dnssec

A TV screenshot of two HSMs
A person holding a box with cryptographic keys inside.

nlnetlabs, to security
@nlnetlabs@fosstodon.org avatar

Coordinating and responsibly disclosing today’s two #DNSSEC #security vulnerabilities has been a huge coordination effort amongst researchers, #DNS implementers and early-access testing by our collective customers. It is a true testament to #OpenSource security and resilience. Our thanks go out to everyone involved! 💚🛡️💚 https://nlnetlabs.nl/projects/unbound/security-advisories/

selea, to infosec

ICANN recently started to recommend all domains to deploy DNSSEC as a consequence after the first successful attack against a non-signed domain.

Please enable DNSSEC on your domain in order to protect your users.

#mastoadmin #dns #dnssec #infosec

https://www.icann.org/news/announcement-2019-02-22-en

heiseonline, to email German

Transportsicherheit: BSI zertifiziert E-Mail-Dienste nach neuer Richtlinie

Das BSI hat ein neues Zertifizierungsverfahren für E-Mail-Provider auf Basis einer aktualisierten Technischen Richtlinie zur Transportsicherheit aufgesetzt.

https://www.heise.de/news/Transportsicherheit-BSI-zertifiziert-E-Mail-Dienste-nach-neuer-Richtlinie-9349117.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#BSI #DNSSEC #EMail #Provider #Security #news

nlnetlabs, to security
@nlnetlabs@fosstodon.org avatar

🚨 We have released version 1.19.1 of Unbound resolver, which contains fixes for CVE-2023-50387 and CVE-2023-50868. ⚠️ Please update as soon as possible in order to mitigate two validation vulnerabilities that affect all well-known resolvers. https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/

PowerDNS, to random
@PowerDNS@fosstodon.org avatar

PowerDNS Recursor Security Advisory 2024-01
(PowerDNS Recursor 4.8.6, 4.9.3 and 5.0.2 Released)
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released #dns #dnssec

internetsociety, to random
@internetsociety@techpolicy.social avatar

It's great to see Zambia and Kenya's country code Top-Level Domains #ccTLD re-signing with #DNSSEC recently 👏

https://pulse.internetsociety.org/blog/here-today-gone-tomorrow

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
danyork, to random
@danyork@mastodon.social avatar

For those of us in the admittedly obscure world of #DNS security and #DNSSEC, this is very important as it marks a transition to elliptic curve algorithms…

… but for probably 99.9% of Internet users, this is serious “eyes glaze over” territory. 😃

From: @rr
https://txt.udp53.org/@rr/statuses/01HGT0ZPH6G5E96HZB6GK6E7J1

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
PowerDNS, to random
@PowerDNS@fosstodon.org avatar
zash, to random

As of last night trunk now supports authentication natively for both incoming and outgoing server-to-server connections! 🎉

madnuttah, to homelab

I've released version 1.19.0-3 of my @nlnetlabs image with updated build environments and unbound base to 3.19.0. I have reduced two image layers by adding a separate build stage. The tags of the build environments got pinned for better , too.

Stay safe 💚

https://github.com/madnuttah/unbound-docker

madnuttah, to Magic

I've made a new #workflow which is tagging and releasing #cd built images automatically too. I can't wait for @nlnetlabs releasing a new #unbound version to watch the #magic. Or to watch it fail.

In my dev-env it works like a charm, though.

I don't want to seem arrogant but I guess this is one of the most feature-rich, secure and advanced image around. And always made with ❤️.

Yeah, I'm a bit proud of myself which is rare.
#ci #dns #dnssec #privacy #opensource

nygren, to random

#DNSSEC: bringing together the legendary robustness and lack of obscure failure modes of the #DNS and a #PKI

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

See you in Brussels this week-end for a lightning talk about the .ru #DNSSEC incident https://fosdem.org/2024/schedule/event/fosdem-2024-3740-observations-on-a-dnssec-incident-the-russian-tld/

#FOSDEM

rysiek, (edited ) to sysadmin
@rysiek@mstdn.social avatar

Hug your #DNS recursive resolver #SysAdmin over the next few days. They might need it.

#DNSSEC #KeyTrap

shaft, to ipv6
@shaft@piaille.fr avatar

The Dutch government official Mastodon instance, social.overheid.nl, has #IPv6 and is signed using #DNSSEC

https://piaille.fr/@shaft/110701891918865732

LGS, to random
@LGS@friendsofdesoto.social avatar
PowerDNS, to random
@PowerDNS@fosstodon.org avatar
jpmens, to random
@jpmens@mastodon.social avatar

Yet another #DNS draft: ZONEVERSION

https://datatracker.ietf.org/doc/draft-ietf-dnsop-zoneversion/

I actually like the idea of receiving the SOA serial (zone version) in a response. Makes certain debugs easier

gjherbiet,
@gjherbiet@mamot.fr avatar

@shane_kerr @jpmens I just had the opposite train of thought: (aggressively) discard all cached entries when I know a zone has been updated (increased ZONEVERSION).
Maybe this could make the CDNs stop using dramatically low TTLs on all their records, just in case they might update their zone (or we could more comfortably use higher min-ttl values).
I also some potential to limit of outages caused by bad practice.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • everett
  • osvaldo12
  • magazineikmin
  • thenastyranch
  • rosin
  • normalnudes
  • Youngstown
  • Durango
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • tester
  • InstantRegret
  • ethstaker
  • GTA5RPClips
  • tacticalgear
  • Leos
  • anitta
  • modclub
  • khanakhh
  • cubers
  • cisconetworking
  • provamag3
  • megavids
  • lostlight
  • All magazines