mamot.fr is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mamot.fr est un serveur Mastodon francophone, géré par La Quadrature du Net.

Server stats:

3.5K
active users

#dnssec

4 posts3 participants0 posts today
JP Mens<p>I just glanced at something called a "Nintendo DS emulator", and I've understood it.</p><p>They have no DNSKEY, you see, so they have to emulate the DS.</p><p><a href="https://mastodon.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://mastodon.social/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a> <a href="https://mastodon.social/tags/sorry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sorry</span></a> <a href="https://mastodon.social/tags/notDrunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>notDrunk</span></a></p>
John Shaft<p>tl;dr :<br>- env. 4 215 000 domaines enregistrés dans .fr au 31 décembre 2024<br>- 19,8% des domaines signés avec <a href="https://piaille.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> (≈ 835 000). Chiffre pudiquement qualifié de « modeste ».<br>- 31646 <a href="https://piaille.fr/tags/IDN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IDN</span></a> enregistrés, soit ≈ 0,75% du total. Ridiculement bas</p><p>« Bilan du .fr en 2024 : plus de 800 000 nouveaux noms enregistrés »<br><a href="https://www.afnic.fr/observatoire-ressources/actualites/bilan-du-fr-en-2024-plus-de-800-000-nouveaux-noms-enregistres/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">afnic.fr/observatoire-ressourc</span><span class="invisible">es/actualites/bilan-du-fr-en-2024-plus-de-800-000-nouveaux-noms-enregistres/</span></a></p>
Jan Schaumann<p>"Nope: Strengthening Domain Authentication with Succinct Proofs"</p><p><a href="https://nope-tools.org/nope.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nope-tools.org/nope.pdf</span><span class="invisible"></span></a></p><p>Basically:<br>domain owner <a href="https://mstdn.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> signs their name, then encodes a proof of that DNSSEC chain into a new domain name, stashes that in a SAN in the cert and wants the client to verify the proof against... the root ZSK? Which it fetches via DoH from Google DNS, but... doesn't verify?</p><p>Not sure I get it.</p><p><a href="https://mstdn.social/tags/realworldcrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>realworldcrypto</span></a> <a href="https://mstdn.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a></p>
Jan Schaumann<p>Post-Quantum <a href="https://mstdn.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> Testbed with BIND and PowerDNS </p><p><a href="https://pq-dnssec.dedyn.io/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pq-dnssec.dedyn.io/</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://mstdn.social/tags/RealWorldCrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RealWorldCrypto</span></a> <a href="https://mstdn.social/tags/pqc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pqc</span></a></p>
Death by Lambda<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@rmd1023" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rmd1023</span></a></span> <br><span class="h-card" translate="no"><a href="https://mstdn.social/@jschauma" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jschauma</span></a></span> is the one you want to ask.<br><a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a><br><a href="https://mastodon.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a></p>
gregR ☯<p><span class="h-card" translate="no"><a href="https://mastodon.gougere.fr/@bortzmeyer" class="u-url mention">@<span>bortzmeyer</span></a></span> le principal intérêt de <a href="https://mamot.fr/tags/dnssec" class="mention hashtag" rel="tag">#<span>dnssec</span></a> <br /><a href="https://www.bortzmeyer.org/dns-afrinic-stale.html" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">bortzmeyer.org/dns-afrinic-sta</span><span class="invisible">le.html</span></a><br />Mais vous le connaissez :)<br />Le reste <a href="https://ianix.com/pub/dnssec-outages.html" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">ianix.com/pub/dnssec-outages.h</span><span class="invisible">tml</span></a><br />Avec un petit faible pour Slack <a href="https://lists.dns-oarc.net/pipermail/dns-operations/2021-September/021340.html" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">lists.dns-oarc.net/pipermail/d</span><span class="invisible">ns-operations/2021-September/021340.html</span></a></p>
Stéphane Bortzmeyer<p>Formation <a href="https://mastodon.gougere.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> toute la semaine prochaine. Si vous avez des exemples de trucs DNSSEC rigolos (par exemple des erreurs de configuration, ou au contraire des déploiements réussis), c'est le moment de les citer.</p>
John Shaft<p>Dr. Dre is going elliptic <a href="https://piaille.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> </p><p><a href="https://mastodns.net/@diffroot/114202594031197957" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodns.net/@diffroot/1142025</span><span class="invisible">94031197957</span></a></p>
Éric V.<p>For <a href="https://mamot.fr/tags/email" class="mention hashtag" rel="tag">#<span>email</span></a> configuration and <a href="https://mamot.fr/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> check, the European Commission provides a great tool: MECSA <a href="https://mecsa.jrc.ec.europa.eu/en/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">mecsa.jrc.ec.europa.eu/en/</span><span class="invisible"></span></a><br />conclusion: I still have some improvements to implement on my own server<br /><a href="https://mamot.fr/tags/sysadmin" class="mention hashtag" rel="tag">#<span>sysadmin</span></a> <a href="https://mamot.fr/tags/linux" class="mention hashtag" rel="tag">#<span>linux</span></a> <a href="https://mamot.fr/tags/postfix" class="mention hashtag" rel="tag">#<span>postfix</span></a> <a href="https://mamot.fr/tags/DKIM" class="mention hashtag" rel="tag">#<span>DKIM</span></a> <a href="https://mamot.fr/tags/DMARC" class="mention hashtag" rel="tag">#<span>DMARC</span></a> <a href="https://mamot.fr/tags/DNSSEC" class="mention hashtag" rel="tag">#<span>DNSSEC</span></a> <a href="https://mamot.fr/tags/selfhosting" class="mention hashtag" rel="tag">#<span>selfhosting</span></a></p>
ChaCha20Poly1305<p>@bortzmeyer@mastodon.gouger Aurais-tu des conseils pour fournir une zone DNS&nbsp;via un script Python/Perl qui génère des enregistrements à la volée (sans les stocker) et faire du <a href="https://mastodon.libre-entreprise.com/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>&nbsp;dessus ? Je bataille avec PowerDNS.</p>
PowerDNS<p>First alpha release of PowerDNS DNSdist 2.0.0<br><a href="https://blog.powerdns.com/2025/03/18/first-alpha-release-of-powerdns-dnsdist-2.0.0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.powerdns.com/2025/03/18/f</span><span class="invisible">irst-alpha-release-of-powerdns-dnsdist-2.0.0</span></a> <a href="https://fosstodon.org/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://fosstodon.org/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a></p>
IPFire News<p>IPFire protects your DNS requests from being forged by using <a href="https://social.ipfire.org/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a></p>
Hacklab LogoutEl dia asollellat del matí 🌅 s'ha quedat en un ideal dia plujós 🌧 per encriptar la resolució de noms ( <a class="hashtag" href="https://bcn.fedi.cat/tag/dns" rel="nofollow noopener noreferrer" target="_blank">#DNS</a> ) que per defecte va sense protegir 🔒<br><br>Tutorial! Fem servir <a class="hashtag" href="https://bcn.fedi.cat/tag/resolved" rel="nofollow noopener noreferrer" target="_blank">#resolved</a> per tenir <a class="hashtag" href="https://bcn.fedi.cat/tag/dnssec" rel="nofollow noopener noreferrer" target="_blank">#DNSSEC</a> (autenticitat) i <a class="hashtag" href="https://bcn.fedi.cat/tag/dot" rel="nofollow noopener noreferrer" target="_blank">#DoT</a> <a class="hashtag" href="https://bcn.fedi.cat/tag/doh" rel="nofollow noopener noreferrer" target="_blank">#DoH</a> (confidencialitat i integritat)<br><br>Evitem la vigilància massiva, protegim-nos contra alguns tipus de censura, i contra alguns atacs informàtics 😼<br><br><a href="https://sindominio.net/logout/web/posts/2025-03-16-protegint-peticions-dns" rel="nofollow noopener noreferrer" target="_blank">https://sindominio.net/logout/web/posts/2025-03-16-protegint-peticions-dns</a>
Jan Schaumann<p>System Administration</p><p>Week 7, The Domain Name System, Part III</p><p>In this video, we try to wrap up our discussion of the Domain Name System by addressing the nature of the root nameservers, looking at various different resource record types, observing reverse lookups, and thinking about how we can have assurance of authenticity and integrity of the <a href="https://mstdn.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> results returned to us via <a href="https://mstdn.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>.</p><p><a href="https://youtu.be/XDJEJFVNoko" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/XDJEJFVNoko</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://mstdn.social/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> <a href="https://mstdn.social/tags/SRE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SRE</span></a></p>
gregR ☯<p><span class="h-card" translate="no"><a href="https://mastodon.online/@unixtippse" class="u-url mention">@<span>unixtippse</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@jpmens" class="u-url mention">@<span>jpmens</span></a></span> they are looking for the DS key maybe ?<br /><a href="https://mastodon.gougere.fr/@DNSresolver/114126039762798724" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">mastodon.gougere.fr/@DNSresolv</span><span class="invisible">er/114126039762798724</span></a><br /><a href="https://mamot.fr/tags/dns" class="mention hashtag" rel="tag">#<span>dns</span></a> <a href="https://mamot.fr/tags/DNSSEC" class="mention hashtag" rel="tag">#<span>DNSSEC</span></a></p>
John Shaft<p>So smol 🥺</p><p><a href="https://piaille.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://piaille.fr/tags/ed25519" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ed25519</span></a></p><p><a href="https://piaille.fr/@shaft/114115244980271165" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">piaille.fr/@shaft/114115244980</span><span class="invisible">271165</span></a></p>
John Shaft<p>Ah! .fj going back to secure. A <a href="https://piaille.fr/tags/TLD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLD</span></a> using ed25519, sounds like a first 🤔</p><p>Ping <span class="h-card" translate="no"><a href="https://mastodon.social/@jpmens" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jpmens</span></a></span> </p><p><a href="https://piaille.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a></p><p><a href="https://mastodns.net/@diffroot/114112383277192436" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodns.net/@diffroot/1141123</span><span class="invisible">83277192436</span></a></p>
John Shaft<p>Have not pay much attention to the Compact Denial of Existence in <a href="https://piaille.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> yet.</p><p>Should have : there are nice straws for the <a href="https://piaille.fr/tags/DNSCamel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSCamel</span></a>. :3</p><p>Eg. A new optional EDNS0 header flag (CO - for "Compact Answers OK"). Would be the first one since DO.</p><p><a href="https://datatracker.ietf.org/doc/draft-ietf-dnsop-compact-denial-of-existence/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/draft</span><span class="invisible">-ietf-dnsop-compact-denial-of-existence/</span></a></p>
John Shaft<p>Ah bah j'étais persuadé de ne pas avoir finalisé le roulement de <a href="https://piaille.fr/tags/ZSK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZSK</span></a> sur shaftinc.fr mais en fait si : depuis lundi dernier c'était plié :blobPikaUvU: </p><p><a href="https://dnsviz.net/d/shaftinc.fr/Z7xHVQ/dnssec" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnsviz.net/d/shaftinc.fr/Z7xHV</span><span class="invisible">Q/dnssec</span></a></p><p><a href="https://piaille.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a></p>
Carlos Rodrigues 🪣<p>I don't usually post about work-related stuff, but here's something...</p><p>The state of DNSSEC on the wider Internet is sad, to say the least. Most large services don't sign their domains and most OSes can't do validation —<br>"systemd-resolved" can, but not by default.</p><p>It looks better regarding encryption at the OS level but, again, not by default.</p><p>Combining these two, not even 0.5% of queries are fully protected from tampering.</p><p><a href="https://blog.cloudflare.com/new-dns-section-on-cloudflare-radar/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cloudflare.com/new-dns-se</span><span class="invisible">ction-on-cloudflare-radar/</span></a> 📜<br><a href="https://radar.cloudflare.com/dns" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">radar.cloudflare.com/dns</span><span class="invisible"></span></a> 📈</p><p><a href="https://mastodon.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://mastodon.social/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a></p>