shaft, to random
@shaft@piaille.fr avatar

Here comes a new chall... #DNSSEC Algorithm. Number 23. You will probably never use it (It's a GOST story)

RFC 9558: Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC
https://www.rfc-editor.org/info/rfc9558

mtxvp, to internet

Root KSK Ceremony - the most meticulous security procedure on the internet https://www.cloudflare.com/dns/dnssec/root-signing-ceremony/

shaft, (edited ) to random French
@shaft@piaille.fr avatar

Generating signatures using the private keys from 9500 (a bunch a publicly known private keys, which is a strange concept 🤔) : it works nicely. :3 The keytag for "testECCP256" is 56715 or 56716 (whether it's a ZSK or a KSK).

The RFC lacks ed25519 and ed448 keys though

shaft, to random French
@shaft@piaille.fr avatar

Heureusement, je ne serais sans doute plus là, un peu avant 2106, quand il faudra commencer à se faire des nœuds au cerveau avec l'arithmétique des numéros de série du RFC 1982 appliquée au champs de dates des signatures #DNSSEC

La mortalité a du bon.

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
shaft, to random French
@shaft@piaille.fr avatar

Il y a une vingtaine d'années, l' @afnic avait mis en ligne une auto-formation au #DNS, avec un design très CD-ROM interactif typique de la fin 90's / début du siècle :)

Il y a même du #DNSSEC dans la partie avancée : c'est l'époque des KEY, SIG et autre NXT du DNSSEC 1ère génération

https://web.archive.org/web/20081128073423/https://www.afnic.fr/ext/dns/

shaft, to random
@shaft@piaille.fr avatar

OK, draft-rfc8624-bis says:

“This document simply moves the canonical list of algorithms from [RFC8624] to the IANA registry, and defines the registry policies for updating the registry. It does not change the status of any of the algorithms listed in [RFC8624];”

Now, in the table in section 3, column " Signing", algorithms 5 & 7 are listed as "MUST NOT". They are "NOT RECOMMANDED" in RFC 8624 section 3.1. The recommandation for validation also changes (from "MUST" to "SHOULD NOT")

It is slightly different (for the better imo but still) :)

https://datatracker.ietf.org/doc/draft-hardaker-dnsop-rfc8624-bis/

https://www.rfc-editor.org/rfc/rfc8624.html

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Last working group meeting of , the second meetng of dnsop (all things )

https://datatracker.ietf.org/meeting/119/materials/agenda-119-dnsop-02

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar

Analysis of existing CDS/CDNSKEY records in the wild. They are sometimes broken, sometimes in funny ways (authortative name servers not returning the samed CDS...)

Why would a domain in .com publish a CDS (.com does not handle CDS) and a broken one (does not match the keys)?

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar
bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar

draft-ietf-dnsop-compact-denial-of-existence
Formerly "black lies". For #DNSSEC dynamic signers.

No RFC standardize the reply to metatypes (like NXNAME). Most return FORMERR, PowerDNS returns SERVFAIL.

But biggest issue, IMHO, should we require NXDOMAIN for non-DNSSEC clients? (NS1 returns NOERROR in any case.)

(Tested at the hackathon https://github.com/IETF-Hackathon/ietf119-project-presentations/blob/main/ietf-119-hackathon-DNS.pdf )

#IETF119

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Good morning, Brisbane! Second day of the hackathon.
Let's add more bugs to the code written yetesrday. https://wiki.ietf.org/en/meeting/119/hackathon

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

Good morning, Brisbane! First day of #IETF119, with the hackathon https://wiki.ietf.org/meeting/119/hackathon

Let's take the boat to go there.

bortzmeyer,
@bortzmeyer@mastodon.gougere.fr avatar

Working on Compact Denial of Existence for DNSSEC (what a nice name; before, it was named "black lies" but the name was criticized).

Implementing it on Drink. https://wiki.ietf.org/en/meeting/119/hackathon

shaft, to random
@shaft@piaille.fr avatar

Anyone from around here? validation is broken for www.ripe.net :/

$ gnutls-cli --dane www.ripe.net:443
...

  • Status: The certificate is trusted.
  • DANE: Verification failed. CA constrains were violated.

(Remember that is innocent)

PowerDNS, to random
@PowerDNS@fosstodon.org avatar
danyork, (edited ) to random
@danyork@mastodon.social avatar

Listening to the and Security Workshop at - Kim Davies is currently giving an update about plans to rollover the (Key Signing Key) for DNSSEC.

Interesting to read about the dilemma of the hardware security module (HSM) vendor ceasing to make the HSMs that was using...

(More about HSMs in general: https://en.wikipedia.org/wiki/Hardware_security_module )

danyork,
@danyork@mastodon.social avatar

A key point is that ICANN is now looking to get to a cadence of rolling the KSK every three years. More info on this slide...

danyork,
@danyork@mastodon.social avatar

There was also an update about plans for an algorithm rollover for the KSK. ICANN had a comment period and is working on a revised report.

The key point is that there will NOT be a change in the algorithm this year. They are looking at 2029 as the timeframe for a change.

gyptazy, to security
@gyptazy@gyptazy.ch avatar

To all who are hosting their own server with - what do you use in 2024?

or -P256 or still on some algorithms? Shorter key length is especially in DNS a benefit but still not all resolvers may be able to support this in 2024?!

bortzmeyer, to random French
@bortzmeyer@mastodon.gougere.fr avatar

For #DNSSEC amateurs: .ke authoritative name server NS2KE.DNS.BUSINESS does not always send DNSKEYs when asked for. (And no signatures as well.)

(Unfortunately, it does not return NSID so it is hard to say if the problem is specific to some instances.)

It does not prevent validation since resolvers ask other name servers to find keys/signatures.

madnuttah, to random
shaft, to random French
@shaft@piaille.fr avatar

C'est dimanche, tout le monde fait ses roulements de KSK #DNSSEC

rafe, to tech
@rafe@c.im avatar
shaft, (edited ) to random French
@shaft@piaille.fr avatar

Now that is interesting: reports an related , even with the CD flag set. We know there is a problem but still have the desired result. Nice :3

$ dig @::1 +cd dnssec-failed.org
...
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41039
;; flags: qr rd ra cd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
...
; EDE: 6 (DNSSEC Bogus)...
...
;; ANSWER SECTION:
dnssec-failed.org. 300...

Cloudflare's resolver does the same thing.

$ dig @\1.1.1.1 +cd dnssec-failed.org
...
; EDE: 9 (DNSKEY Missing)...
...
dnssec-failed.org. 300...

Google Public DNS fails at reporting the problem, no EDE in answer.

gbxyz, to random
madnuttah, to Magic

I've made a new #workflow which is tagging and releasing #cd built images automatically too. I can't wait for @nlnetlabs releasing a new #unbound version to watch the #magic. Or to watch it fail.

In my dev-env it works like a charm, though.

I don't want to seem arrogant but I guess this is one of the most feature-rich, secure and advanced image around. And always made with ❤️.

Yeah, I'm a bit proud of myself which is rare.
#ci #dns #dnssec #privacy #opensource

jschauma, to sysadmin
@jschauma@mstdn.social avatar

Hey Fediverse! The Spring semester is about to start, and I'll be teaching System Administration again:

https://stevens.netmeister.org/615/

Topics covered include: basic operating system & filesystem concepts, software installation & package management, config management, automation, tools development, TCP/IP networking, common services, system security.

All lectures are online as free videos; if you'd like to follow along, here's the playlist for Week 1:

https://www.youtube.com/playlist?list=PLDadzdouM0VCV7tjurqM8FHY6APK9wvJl

jschauma,
@jschauma@mstdn.social avatar

It's week 07 of my class, high time we talk about the cause of (and solution to) all problems: the .

We look at the history of the DNS and how we used to copy giant hosts file around, trace DNS packets from resolvers to the root servers and the various authoritative NS using our good friend , talk about , fetch the root zone from InterNIC to bootstrap our resolver, look at different RRs, reverse lookups, and touch upon .

https://youtube.com/playlist?list=PLDadzdouM0VBS5HGDBPMslFwfvWWNRTdU&si=Qa-Hu2klG1RDrLtV

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • tester
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • tacticalgear
  • osvaldo12
  • normalnudes
  • cubers
  • cisconetworking
  • everett
  • GTA5RPClips
  • ethstaker
  • Leos
  • provamag3
  • anitta
  • modclub
  • lostlight
  • All magazines