@nlnetlabs@fosstodon.org
@nlnetlabs@fosstodon.org avatar

nlnetlabs

@nlnetlabs@fosstodon.org

Dutch #NonProfit foundation proudly serving the Internet community since 1999 with #OpenSource software for #DNS and #BGP. Applied research, open standards advocates, bridging technology and policy.

#Clang origins, now #rustlang aficionados. The people behind Unbound, NSD, Routinator, Rotonda and much more...

Account maintained by https://social.secret-wg.org/@benno, https://hachyderm.io/@alexband, @maarten, @jasper, https://social.tchncs.de/@partim and @willem.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

As part of our ‘domain' library project, we are including diagnostics tooling. Instead of simply reimplementing ‘dig' in , we wanted to rethink what operators would want from such a command line tool. Today, we're happy to release version 0.1.0 of ‘dnsi’. https://crates.io/crates/dnsi

nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

We love contributing to the community! For day 2 of @rustnl 2024, @alexband passed the hosting baton to the newest member of our dev team, @terts. 💚🦀

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Today we released Unbound 1.20.0. This release has a fix for the DNSBomb issue CVE-2024-33655, which had a low severity for our #DNS resolver. https://nlnetlabs.nl/news/2024/May/08/unbound-1.20.0-released/

nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

We’re pleased to announce the release of version 0.10.0 of “domain”, our crate for interacting with the . This release results from the first three months of increased focus on the library, with three full-time developers and a one-year commitment from @sovtechfund.

We included three major new features: the client side of sending DNS messages, its server counterpart, and the machinery for representing DNS zones. Read all about it in this post. https://nlnetlabs.nl/news/2024/Apr/29/domain-0.10.0-released/

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

NLnet Labs co-founder Frances Brazier received a knighthood (“Ridder in de Orde van de Nederlandse Leeuw”) last Friday.

Frances has been a visionary in recognising the potential of IP-based networking. As a co-founder of NLnet @NGIZero, she played a crucial role in shaping the Dutch internet landscape.

Her commitment to an open and accessible internet continued with the creation of NLnet Labs, dedicated to research and development of open standards and software.

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

The pre-release of NSD 4.10.0 is now available. This version of our authoritative server dramatically speeds up zone loading and IXFRs, up to almost four times faster than the previous implementation! 🏎️

Please test out this Release Candidate on every kind of architecture and operating system you can find to help us iron out the corner cases we haven’t found ourselves yet. 💚🙏 https://lists.nlnetlabs.nl/pipermail/nsd-users/2024-April/003302.html

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Our new SIMD-capable zonefile parser is now part of the NSD main branch as a submodule. We'll finish the latest tests today and then make it available as a pre-release to allow you to test the speed improvements. We're curious to hear how this performs in your systems! https://github.com/NLnetLabs/nsd/pull/328

fsfe, to random
@fsfe@mastodon.social avatar

💡 The @NGIZero initiative aims to build a more resilient, trustworthy and open Internet that empowers end users to control technology. 🚀

💥 The :fsfe: is a partner of the Next Generation Internet Zero consortium, involved in several projects coordinated by @nlnetlabs! 👀

ℹ️ Learn more about this EU initiative ⤵️
https://fsfe.org/activities/ngi/ngi.html

nlnetlabs,
@nlnetlabs@fosstodon.org avatar

@fsfe @NGIZero
Though NLnet, with the Mastodon handle @NGIZero, are great friends of ours, they are a distinct entity from @nlnetlabs. We are dedicated to writing open source software and actively developing open standards to ensure an open internet for everyone.

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar
nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

Heading into the weekend, our team delivered an absolutely massive milestone with initial server capabilities for our ‘domain' library. On Monday, we'll package it up with a report for @sovtechfund. 🎁 https://github.com/NLnetLabs/domain/pull/274

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

We're super happy to release version 4.9.0 of NSD, our authoritative server. This release adds support for Catalog Zones (RFC 9432) version "2". https://lists.nlnetlabs.nl/pipermail/nsd-users/2024-April/003297.html

dansup, to fediverse
@dansup@mastodon.social avatar

Fun fact, Pixelfed was the first #fediverse project that NGI funded back in early 2020 😎

nlnetlabs,
@nlnetlabs@fosstodon.org avatar

@mwfc @gpollara @dansup NLnet uses the @NGIZero account. :)

waag, (edited ) to fdroid Dutch
@waag@waag.social avatar

Our smartphones, operating systems and apps are dominated by Google & Apple. "[...] these two Silicon Valley profit-driven companies decide which apps are or aren't allowed, and moderate what our mobile software looks like." says @danlammerhirt from @waag working on the Mobifree project (together with a.o. @efoundation @fdroid @NGIZero @murena @microg @delta

https://waag.org/en/article/why-smartphones-are-key-better-internet/

nlnetlabs,
@nlnetlabs@fosstodon.org avatar

@waag @danlammerhirt @efoundation @fdroid @murena @microg @delta We are NLnet Labs; we develop software for Core Internet Infrastructure. We presume you meant to mention the NLnet Foundation - @NGIZero (don't worry, it happens a lot).

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

The first Release Candidate of NSD 4.9.0 is now available, which adds support for Catalog Zones (RFC 9432) version "2". https://lists.nlnetlabs.nl/pipermail/nsd-users/2024-March/003294.html

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We're implementing fast_reload in Unbound resolver. It works by creating a thread that reads the configuration and allocates memory. Then, it quickly halts the other threads, updates the config and swaps the trees of forwards and stubs in place, and continues the other threads. A test with thousands of forwards has a reload time of 0.027s with 0.0003s spent in halting the other threads. https://github.com/NLnetLabs/unbound/pull/1015

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

Since last November, we've been quite busy with security releases for Unbound. Now, with this latest bug fix release out the door, our aim is to get some features released we've been preparing, such as DNS-over-QUIC and upstream cookies. 🍪🍪 https://github.com/NLnetLabs/unbound/milestone/3

nlnetlabs, to random
@nlnetlabs@fosstodon.org avatar

We're happy to introduce Unbound 1.9.3. This a bug fix release of our #DNS resolver, fixing a smörgåsbord of small issues. https://nlnetlabs.nl/news/2024/Mar/14/unbound-1.19.3-released/

shaft, to random
@shaft@piaille.fr avatar

The client handles EDE in a funny way : it dumps the extra text in hexadecimal and then a decoded version.

It is funny because the EXTRA-TEXT field is clearly defined as a UTF-8 encoded field (RFC 8914 section 2).

I guess that @nlnetlabs are so used to handle text field just defined as binary stuff (eg TXT records) that they did not pay attention to that :')

$ drill -D dnssec-failed.org
;; ->>HEADER<<- opcode: QUERY, rcode: SERVFAIL, id: 24
47
...
; EDE: 6 (DNSSEC Bogus): 76 61 6c 69 [...] (validation failure [...])

nlnetlabs,
@nlnetlabs@fosstodon.org avatar

@shaft We stopped the development of Drill (as part of ldns). Luckily, we're committed to building brand new diagnostic tooling as part of our 'domain' project. https://blog.nlnetlabs.nl/domain-dns-building-blocks-for-rust-application-developers/

nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

We are incredibly excited that @terts has joined our team! In addition to being a super nice person, his experience in with his work on will be fantastic to have onboard. Now, what will it be? or … 👋

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

Catalog Zones for NSD is now properly documented, courtesy of @willem. https://nsd.docs.nlnetlabs.nl/en/latest/catalog-zones.html

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

Merged and already battle-tested in production by @sunet: Catalog Zones for our authoritative nameserver NSD. This implementation does the task from within the transfer daemon (xfrd). 😻 https://github.com/NLnetLabs/nsd/pull/304

nlnetlabs, to opensource
@nlnetlabs@fosstodon.org avatar

It's a busy time for our package maintainers again, so today, we want to express and appreciation for the many packaging efforts for our projects. It's what makes great! 💌💌 https://blog.nlnetlabs.nl/nlnet-labs-loves-packagers/

nlnetlabs, to security
@nlnetlabs@fosstodon.org avatar

Coordinating and responsibly disclosing today’s two #DNSSEC #security vulnerabilities has been a huge coordination effort amongst researchers, #DNS implementers and early-access testing by our collective customers. It is a true testament to #OpenSource security and resilience. Our thanks go out to everyone involved! 💚🛡️💚 https://nlnetlabs.nl/projects/unbound/security-advisories/

nlnetlabs, to security
@nlnetlabs@fosstodon.org avatar

🚨 We have released version 1.19.1 of Unbound resolver, which contains fixes for CVE-2023-50387 and CVE-2023-50868. ⚠️ Please update as soon as possible in order to mitigate two validation vulnerabilities that affect all well-known resolvers. https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/

nlnetlabs, to rust
@nlnetlabs@fosstodon.org avatar

The NLnet Labs crew had a blast at last weekend. @partim presented in the Devroom on the ‘domain' crate, a library in serving as building blocks for developers. Development is commissioned by the @sovtechfund in 2024 and covers client, server and proxy functionality. Watch the recording here: https://fosdem.org/2024/schedule/event/fosdem-2024-2853-domain-a-modular-rust-dns-toolkit/ or read the blog post here: https://blog.nlnetlabs.nl/domain-dns-building-blocks-for-rust-application-developers/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • InstantRegret
  • rosin
  • modclub
  • Youngstown
  • khanakhh
  • Durango
  • slotface
  • mdbf
  • cubers
  • GTA5RPClips
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • osvaldo12
  • tester
  • tacticalgear
  • ethstaker
  • Leos
  • thenastyranch
  • everett
  • normalnudes
  • anitta
  • megavids
  • cisconetworking
  • lostlight
  • All magazines