social.dk-libre.fr is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #dnssec

[?]John Shaft »
@shaft@piaille.fr

[?]John Shaft »
@shaft@piaille.fr

One more straw on the camel's back! Yay! \o/

Compact Denial of Existence in is finally published as RFC 9824

Introducing a new EDNS header flag: CO (Compact Answers OK). As it's the first time a new one is added, it will surely run smoothly with stupid middleboxes \o/

It additionnaly adds more traditionnal stuff: a new RR (NXNAME) and a new EDE (Invalid Query Type)

rfc-editor.org/info/rfc9824

    [?]NLnet Labs »
    @nlnetlabs@social.nlnetlabs.nl

    @nor4 I'm sorry you feel that way nora. We don’t launch a new product very often, and we have a lot depending on the success of this endeavor.

    Making our model sustainable is incredibly hard. Everything depends on the industry being aware of what we're doing, how and why.

    We cannot afford solely developing and maintaining a new product and quietly wait for it to become financially self-sustaining. Our continued existence depends on it.

      AodeRelay boosted

      [?]Alex Band »
      @alexband@hachyderm.io

      @mejofi @nor4 Let's make this a little more personal. Hi Joni! It's Alex from @nlnetlabs and I'm responsible for keeping the lights on. 👋

      When NLnet Labs was founded in 1999, the foundation could be run on the bag of money Verizon gave NLnet, the first Dutch ISP with country wide coverage. This money, and two talented developers gave the world NSD authoritative server, and Unbound recursive resolver; two and liberally licensed projects we maintain to this day.

      No marketing was needed, social media didn’t exist — good old word of mouth did the job. And if it didn’t, that was fine too. Talented developers like we're blessed to have can find a job anywhere.

      It was only some 15 years later when NLnet Labs almost ran out of money that the internet community realised that they should play a part in our financial sustainablility, instead of doing an `apt install unbound` and resolve happily ever after.

      Letting the product speak for itself isn’t enough to keep the lights on. We barely got away with it with Routinator, but that's only because we were the first with a well rounded solution for .

      With Cascade we're placing a product in an established signing market, which includes people who are dependent on OpenDNSSEC, which we're EoL-ing. We also need to remind people that “free" in Open Source isn’t just the “as in speech” part.

      Without marketing, finance, HR, legal, shareholders or a corporate sugar daddy I’m responsible for the livelihood of 16 people, 6 of which are working on Cascade. I’m betting everything on this. So yes, I turned the volume up to 11, and yes I post the same content to LinkedIn, and yes perhaps I should be fine tuning the messaging to each target audience. I'll put my comms team right on it! Oh, hang on...

      I hope you enjoy the things we’ve been doing for the and community for the last 25 years. My goal is to make sure we can do this for at least another 25. I promise we'll do in-depth technical blog posts too, but right now the team is trying to make sure we can demo something at @dnsoarc in three weeks.

      Please bear with us and stay tuned! 💚

        Remi Gacogne boosted

        [?]PowerDNS »
        @PowerDNS@fosstodon.org

        PowerDNS Security Advisory 2025-05 for DNSdist: Denial of service via crafted DoH exchange
        (DNSdist 1.9.11 and 2.0.1 released)

        blog.powerdns.com/2025/09/18/p

          0 ★ 3 ↺
          victor héry boosted

          [?]oldsysops »
          @oldsysops@social.dk-libre.fr

          Have a question on DNSSEC KEY rollover (and bind).
          If i set up inline-signing and dnssec-policy on a zone, the key will rollover automatically ?
          I've just to put the DS record once, and it will rotate without an issue ?


            [?]Alex Band »
            @alexband@hachyderm.io

            @bortzmeyer @nlnetlabs @benno Maybe wait talking about it on TV until you can show a DNSViz result of a domain signed by Cascade?

              [?]Alex Band »
              @alexband@hachyderm.io

              @bortzmeyer @nlnetlabs @benno @dnsoarc We'll do a live demo on stage at OARC45—what could possibly go wrong? 😉

              So after that, we look forward to you running Cascade through its paces and give us your honest feedback.

              That should put us in a position to cross all the t's and dot all the i's before the first production release, towards the end of the year.

                [?]NLnet Labs »
                @nlnetlabs@social.nlnetlabs.nl

                @bortzmeyer @benno @alexband We love your enthusiasm, but right now we're putting together all the components that make up Cascade. By the time @dnsoarc 45 comes around, we'll have a package for you that you can just run.

                We've got the scaffolding for the installation documentation sitting in a Pull Request here: cascade-signer--41.org.readthe

                  [?]Guillaume-Jean Herbiet »
                  @gjherbiet@mamot.fr

                  @Toch

                  Bureau d’enregistrement : @lebureau_coop lebureau.coop
                  À voir pour la possibilité de payer pour plusieurs années car c’est une prérogative du registre et pas du BE

                  Fournisseur DNS : desec.io

                    [?]ChaCha20Poly1305 »
                    @camille@mastodon.libre-entreprise.com

                    Il semblerait que active « filterwin2k » silencieusement quand « dnssec » est activé, ce qui filtre les SRV et les TLSA. Bref j’ai viré dnsmasq pour le et l’ai remplacé par

                    CC @bortzmeyer @shaft

                      AodeRelay boosted

                      [?]NLnet Labs »
                      @nlnetlabs@social.nlnetlabs.nl

                      Tuesday, we dropped our report with insights from 16 top-level domain operators.

                      Yesterday, we launched Cascade — NLnet Labs’ Rust-built successor to OpenDNSSEC, shaped by what keeps TLDs up at night.

                      Today, we’re kicking off a series of ultrashort videos where @benno and @alexband break down what makes Cascade different.

                      First up: the #1 request from the community — observability, please.

                      We heard you.

                      🎥. youtu.be/CgmVjLv-fy4

                        Alexandre :freebsd: boosted

                        [?]NLnet Labs »
                        @nlnetlabs@social.nlnetlabs.nl

                        🚨 Announcing Cascade — DNSSEC signing, rebuilt from the ground up.

                        With 25 years of experience, we set the standard with signing that delivers under pressure.
                        Cascade is how we carry the legacy forward.

                        Explore Cascade at blog.nlnetlabs.nl/cascade/

                        Unbox with us.
                        Cascade debuts live October 7 @ @dnsoarc 45, Stockholm.
                        We’ll show you what’s under the hood — and why this changes everything.

                        A huge thanks to the DNS community for making Cascade possible!

                          AodeRelay boosted

                          [?]NLnet Labs »
                          @nlnetlabs@social.nlnetlabs.nl

                          Tomorrow we drop details on the DNSSEC signer we built.
                          Today, we're dropping the pretence.

                          Before we wrote a line of code, we asked 16 TLDs:
                          "What keeps you up at night?"

                          We expected shop talk.
                          We got meaningful discussions that taught us DNSSEC in 2025 isn’t just a tech issue.
                          It’s a control issue.
                          And the fear of losing it is real.

                          👉 Read the full report: blog.nlnetlabs.nl/dnssec-opera

                            [?]JP Mens »
                            @jpmens@mastodon.social

                            I'm sure I'm being expected to quote this, so I will:

                            “With OpenDNSSEC, it was a black box. You had to dive into the code — and even then, we sometimes couldn’t figure it out.”

                            ---

                            “We’ve stopped even trying to Dockerise it — too brittle.”

                            blog.nlnetlabs.nl/dnssec-opera

                              [?]Stéphane Bortzmeyer »
                              @bortzmeyer@mastodon.gougere.fr

                              Pecha-Kucha (funny talk) of Barbara Jantzen at the last meeting, about . Next time you have a DNSSEC issue, watch the video. youtube.com/watch?v=7mQ5x7Jpj4

                              (For my French-speaking followers: good level of englsh required.)

                                [?]Stéphane Bortzmeyer »
                                @bortzmeyer@mastodon.gougere.fr

                                A error I had never seen in the wild before. Discrepancy between the "original TTL" field of the signature and the real original TTL.

                                dnsviz.net/d/culture.gouv.fr/a

                                (Look hard, it happens only with one of the three NSEC3 records.)

                                  [?]NLnet Labs »
                                  @nlnetlabs@social.nlnetlabs.nl

                                  The industry loves to boast about “five nines” availability — 99.999%. That sounds impressive: just five minutes of downtime a year.

                                  But isn’t like most industries. Read more about today’s TLD challenges in our blog post The Illusion of Five Nines. blog.nlnetlabs.nl/the-illusion

                                    [?]Stéphane Bortzmeyer »
                                    @bortzmeyer@mastodon.gougere.fr

                                    But I find strange that is not mentioned when the author speaks about checking the content of the root zone.
                                    ZONEMD, which is mentioned, works only if the client downloads the entire root zone, something that the typical resolver does not do.

                                      JP Mens boosted

                                      [?]Kal Feher »
                                      @kalfeher@infosec.exchange

                                      I've updated CDS tracking charts to show 360 days of aggregated trends. TBH the trend is pretty clear. CDS usage overall is going down and TLD zones are less correct over time. possibly related

                                      kalfeher.com/analysis/cds-char

                                        opio ⏚ boosted

                                        [?]Afnic »
                                        @afnic@mastodon.social

                                        🤔 Comment déployer DNSSEC et se prévenir du détournement des réponses DNS ?

                                        📅 Webinaire gratuit organisé par l'Afnic le jeudi 25 septembre avec Stéphane Bortzmeyer, Michaël Timbert et Lotfi Benyelles de 14h à 15h.

                                        ➡️ Toutes les infos pour vous inscrire : webikeo.fr/landing/protocole-d

                                        Webinaire Protocole DNSSEC Comment le déployer et prévenir le détournement des réponses DNS ? Jeudi 25 septembre 14h-15h

                                        Alt...Webinaire Protocole DNSSEC Comment le déployer et prévenir le détournement des réponses DNS ? Jeudi 25 septembre 14h-15h

                                          🗳
                                          John Shaft boosted

                                          [?]ChaCha20Poly1305 »
                                          @camille@mastodon.libre-entreprise.com

                                          En France, voir en Europe, est-ce que vous seriez d’accord pour rendre obligatoire l’ et le (pour les opérateurs/registrars/zones/routeurs/smartphones/serveurs/services…). Merci de repartager.

                                          Oui:44
                                          Non:14

                                          Closed

                                            🗳

                                            [?]ChaCha20Poly1305 »
                                            @camille@mastodon.libre-entreprise.com

                                            For people using for their zone, what do you use for signing ? Please re-share. For other choices, you can comment and you can ask me to check your domain name in private message.

                                            RSA with SHA1 ⚠️ Weak !:1
                                            RSA with SHA256 or SHA512 ✅:8
                                            ECDSA with SHA256 or SHA384 ✅✨:46
                                            ED25519 or ED448✅✨:22

                                            Closed

                                              [?]Stéphane Bortzmeyer »
                                              @bortzmeyer@mastodon.gougere.fr

                                              I missed the info but Microsoft is deploying to many Outlook / Hotmail systems:

                                              framagit.org/-/snippets/7528

                                                [?]Stéphane Bortzmeyer »
                                                @bortzmeyer@mastodon.gougere.fr

                                                Changer de BE (Bureau d'Enregistrement), cela implique quoi en pratique ? Un récit très détaillé et très bien vu d'un titulaire qui veut échapper aux augmentations de tarif de Gandi shaarli.guiguishow.info/?hCft1