social.dk-libre.fr is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #dnssec

Fred de CLX boosted

[?]NLnet Labs » 🌐
@nlnetlabs@social.nlnetlabs.nl

Please pray to the live demo Gods over lunch so @ximon18 can show you our signer Cascade in action this afternoon at @dnsoarc 46.

We’ll cover incremental signing with IXFR in and out with TSIG, all on a YubiHSM we packed. 🤞

    [?]NLnet Labs » 🌐
    @nlnetlabs@social.nlnetlabs.nl

    @ximon18 @dnsoarc after his talk on stage, Ximon will be at the demo table in the lunch area, where he can show all the other tricks Cascade has learned since OARC 45 in Stockholm.

    Also, make sure to bring your zone files so you can for example see how fast parallel signing by @bal4e really is.

      [?]Stéphane Bortzmeyer » 🌐
      @bortzmeyer@mastodon.gougere.fr

      root zone key rollover under way. (Planned for 11 october.)

      "Who in the room has root access to his resolver?" (Lot of hands, this is an OARC meeting.)

        [?]Stéphane Bortzmeyer » 🌐
        @bortzmeyer@mastodon.gougere.fr

        Wonderful list of things that can go wrong (and therefore, will) in operations.

        (Including an error done on friday afternoon and fixed, will you guess, on monday.)

          Wallace boosted

          [?]Stéphane Bortzmeyer » 🌐
          @bortzmeyer@mastodon.gougere.fr

          The real world is complicated. For signing a .cn domain, it was necessary to send DS records by email... For .br, errors are not corrected 24x7, only during business hours. (Not always the registry's fault, sometimes you have to use a lot of intermediaries.)

            Remi Gacogne boosted

            [?]PowerDNS » 🌐
            @PowerDNS@fosstodon.org

            [?]John Shaft » 🌐
            @shaft@piaille.fr

            Hey, .ml (ccTLD for Mali) is using !

            $ dig +short ml. DS
            21942 15 2 <crypto shenanigans>

            (the number 15 indicates algorithm 15 aka ed25519)

            So number of using algorithm 15: 3
            - .fj (Fiji)
            - .pg (Papua New Guinea)
            - .ml

              Fred de CLX boosted

              [?]BastilleBSD :freebsd: » 🌐
              @BastilleBSD@fosstodon.org

              Reviewing DNS logs and noticed that `vuxml.freebsd.org` fails DNSSEC validation but `matrix-dev.freebsd.org` passes.

              Can anyone else confirm or is my software buggy?

              2026-05-08 03:27 UTC 10.17.89.66 matrix-dev.freebsd.org. v SEC
2026-05-08 03:27 UTC 10.17.89.66 matrix-dev.freebsd.org. v SEC
2026-05-08 03:22 UTC 10.17.89.18 vuxml. freebsd. org. Xx SEC
2026-05-08 03:21 UTC 10.17.89.19 vuxml. freebsd. org. Xx SEC
2026-05-08 03:17 UTC 10.17.89.66 vuxml. freebsd. org. Xx SEC
2026-05-08 03:06 UTC 10.17.89.42 vuxml. freebsd. org. Xx SEC

              Alt...2026-05-08 03:27 UTC 10.17.89.66 matrix-dev.freebsd.org. v SEC 2026-05-08 03:27 UTC 10.17.89.66 matrix-dev.freebsd.org. v SEC 2026-05-08 03:22 UTC 10.17.89.18 vuxml. freebsd. org. Xx SEC 2026-05-08 03:21 UTC 10.17.89.19 vuxml. freebsd. org. Xx SEC 2026-05-08 03:17 UTC 10.17.89.66 vuxml. freebsd. org. Xx SEC 2026-05-08 03:06 UTC 10.17.89.42 vuxml. freebsd. org. Xx SEC

                AodeRelay boosted

                [?]JP Mens » 🌐
                @jpmens@mastodon.social

                [?]John Shaft » 🌐
                @shaft@piaille.fr

                L'incident du .de m'a permis de constater que welt.de est signé avec . Rép à ça lemonde.fr :pika:

                  [?]JP Mens » 🌐
                  @jpmens@mastodon.social

                  Quad1 and Quad9 appear to have added an NTA (negative trust anchor) for .DE which means validators will no longer validate domains below *.DE; the situation will thus resolve (pun not really intended) itself soon’ish if temporarily until the root cause is fixed and the NTAs are removed.

                  Quad8 is still validating .DE

                  Here is Quad9’s NTA: quad9.net/api/ntas.txt

                    [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                    @rysiek@mstdn.social

                    DENIC's status page:
                    status.denic.de/

                    Screenshot below in case you're not able to load it (as I said, stuff is going to be intermittently failing).

                    DNSSEC disruption affecting .de domainsPartial Service Disruption

Incident Status

Partial Service Disruption

Components

DNS

Services

DNS Nameservice

May 5, 2026 23:28 CEST
May 5, 2026 21:28 UTC
INVESTIGATING

Frankfurt am Main, 5 May 2026 – DENIC eG is currently experiencing a disruption in its DNS service for .de domains. As a result, all DNSSEC-signed .de domains are currently affected in their reachability.
The root cause of the disruption has not yet been fully identified. DENIC’s technical teams are working intensively on analysis and on restoring stable operations as quickly as possible.
Based on current information, users and operators of .de domains may experience impairments in domain resolution. Further updates will be provided as soon as reliable findings on the cause and recovery are available.
DENIC asks all affected parties for their understanding.
For further enquiries, DENIC can be contacted via the usual channels.

                    Alt...DNSSEC disruption affecting .de domainsPartial Service Disruption Incident Status Partial Service Disruption Components DNS Services DNS Nameservice May 5, 2026 23:28 CEST May 5, 2026 21:28 UTC INVESTIGATING Frankfurt am Main, 5 May 2026 – DENIC eG is currently experiencing a disruption in its DNS service for .de domains. As a result, all DNSSEC-signed .de domains are currently affected in their reachability. The root cause of the disruption has not yet been fully identified. DENIC’s technical teams are working intensively on analysis and on restoring stable operations as quickly as possible. Based on current information, users and operators of .de domains may experience impairments in domain resolution. Further updates will be provided as soon as reliable findings on the cause and recovery are available. DENIC asks all affected parties for their understanding. For further enquiries, DENIC can be contacted via the usual channels.

                      [?]John Shaft » 🌐
                      @shaft@piaille.fr

                      Am I the only one having problems with ?

                      Unbound is throwing me a lot of DNSSEC bogus on some .de domains 🤔

                      $ dig welt.de
                      ...
                      ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 21366
                      ...
                      ; EDE: 6 (DNSSEC Bogus): (validation failure <welt.de. A IN>: signature crypto failed from 2a02:568:0:2::53 for DS welt.de. while building chain of trust)

                        John Shaft boosted

                        [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                        @rysiek@mstdn.social

                        Edit: issue seems fixed.

                        Looks like DE ccTLD is unresolvable due to DNSSEC issue:
                        dnsviz.net/d/nic.de/afpsNg/dns

                        😬

                        🧵👇

                          [?]Michał "rysiek" Woźniak · 🇺🇦 » 🌐
                          @rysiek@mstdn.social

                          RE: mastodon.social/@jpmens/116522

                          IANA has a chance to do the funniest thing ever… :blobcatpeek:

                          John Shaft boosted

                          [?]JP Mens » 🌐
                          @jpmens@mastodon.social

                          Rolling the root key:

                          "The next KSK key roll is underway as of May 2026. This is not a change of algorithm, but simply a change of the private key value. The incoming KSK (KSK-2024) was published on the IANA website in July 2024 and added to the root zone’s DNSKEY Resource Record in January 2025. The IANA plans to roll the KSK in October 2026, when it will be used for generating the root zone’s DNSKEY Resource Record digital signatures"

                          blog.apnic.net/2026/05/05/roll

                              John Shaft boosted

                              [?]JP Mens » 🌐
                              @jpmens@mastodon.social

                              Rolling the root key:

                              "The next KSK key roll is underway as of May 2026. This is not a change of algorithm, but simply a change of the private key value. The incoming KSK (KSK-2024) was published on the IANA website in July 2024 and added to the root zone’s DNSKEY Resource Record in January 2025. The IANA plans to roll the KSK in October 2026, when it will be used for generating the root zone’s DNSKEY Resource Record digital signatures"

                              blog.apnic.net/2026/05/05/roll

                                [?]gregR ☯ » 🌐
                                @gregr@mamot.fr

                                @bortzmeyer après plusieurs timeout
                                Mais je suis en forêt avec un téléphone
                                C'est pas idéal pour déboguer :-) surtout sur lequel je suis nul

                                Une chienne noire dans un chemin forestier

                                Alt...Une chienne noire dans un chemin forestier

                                  nicolas boosted

                                  [?]PowerDNS » 🌐
                                  @PowerDNS@fosstodon.org

                                  JP Mens boosted

                                  [?]PowerDNS » 🌐
                                  @PowerDNS@fosstodon.org

                                  PowerDNS Security Advisory 2026-05 for PowerDNS Authoritative Server
                                  (aka PowerDNS Authoritative Server 4.9.14 and 5.0.4 released)

                                  blog.powerdns.com/2026/04/22/p

                                    JP Mens boosted

                                    [?]PowerDNS » 🌐
                                    @PowerDNS@fosstodon.org

                                    PowerDNS Security Advisory 2026-03 for PowerDNS Recursor
                                    (aka PowerDNS Recursor 5.2.9, 5.3.6 and 5.4.1 released)

                                    blog.powerdns.com/2026/04/22/p

                                      John Shaft boosted

                                      [?]PowerDNS » 🌐
                                      @PowerDNS@fosstodon.org

                                      PowerDNS Security Advisory 2026-04 for PowerDNS DNSdist
                                      (aka DNSdist 1.9.13 and 2.0.4 released)

                                      blog.powerdns.com/2026/04/22/p

                                        [?]John Shaft » 🌐
                                        @shaft@piaille.fr

                                        [?]John Shaft » 🌐
                                        @shaft@piaille.fr

                                        Well at least it is signed with 😬😬


                                        piaille.fr/@shaft/116324300412

                                        The "X, X everywhere" from Toy Story 2 but redrawn by @gee@framapiaf.org. This version reads "Amazon, Amazon everywhere"

                                        Alt...The "X, X everywhere" from Toy Story 2 but redrawn by @gee@framapiaf.org. This version reads "Amazon, Amazon everywhere"

                                          Remi Gacogne boosted

                                          [?]PowerDNS » 🌐
                                          @PowerDNS@fosstodon.org

                                          PowerDNS DNSdist 1.9.12 and 2.0.3 Released (Security Release)

                                          blog.powerdns.com/2026/03/31/p

                                            Remi Gacogne boosted

                                            [?]NLnet Labs » 🌐
                                            @nlnetlabs@social.nlnetlabs.nl

                                            We're thrilled that Cascade is among the first projects supported by the Nominet DNS Fund.

                                            With Nominet's support, our new DNSSEC signing solution receives a massive push forward, allowing our team to focus on implementing speed improvements, a reduced memory footprint and essentials such as incremental signing.

                                            We'll be launching a beta in April, followed by an initial production release in June 2026.

                                            Read more: nominet.uk/news/nominet-suppor

                                            Nominet DNS Fund banner

                                            Alt...Nominet DNS Fund banner

                                              [?]Stéphane Bortzmeyer » 🌐
                                              @bortzmeyer@mastodon.gougere.fr

                                              If we start to use Merkle trees for signatures, as currently discussed at , this would create a lot of new interesting blog posts and @dnsoarc meeting talks 😋

                                                [?]Stéphane Bortzmeyer » 🌐
                                                @bortzmeyer@mastodon.gougere.fr

                                                So, previously on post-quantum : not a lot of action. Standardized post-quantum cryptography algorithms like ML-DSA have keys and signatures which are way too long for the .

                                                mastodon.gougere.fr/@DNSresolv

                                                TLS can deal with it (they run on TCP or QUIC) but we cannot, with UDP. No obvious solution.

                                                  JP Mens boosted

                                                  [?]PowerDNS » 🌐
                                                  @PowerDNS@fosstodon.org

                                                  GuB boosted

                                                  [?]NLnet Labs » 🌐
                                                  @nlnetlabs@social.nlnetlabs.nl

                                                  With memory prices skyrocketing we're happy to bring you some good news on the front.

                                                  In version 4.14.0 of our authoritative nameserver NSD we vastly reduced the memory footprint by refactoring the RDATA storage, with gains up to 50%.

                                                  Overall, relatively large -signed zones like .nl and .se benefit the most, but being able to bring the memory requirements to serve .com below 64GB is pretty awesome too.

                                                  We're eager to hear the improvements you're seeing!

                                                  blog.nlnetlabs.nl/smaller-fast