social.dk-libre.fr is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Search results for tag #dnssec

Remi Gacogne boosted

[?]PowerDNS » 🌐
@PowerDNS@fosstodon.org

PowerDNS Security Advisory 2026-01
(aka PowerDNS Recursor 5.1.10, 5.2.8 and 5.3.5 released)

blog.powerdns.com/2026/02/09/p

    2 ★ 0 ↺

    [?]oldsysops » 🌐
    @oldsysops@social.dk-libre.fr

    days without breaking all thing : 0

      [?]JP Mens » 🌐
      @jpmens@mastodon.social

      [?]Stéphane Bortzmeyer » 🌐
      @bortzmeyer@mastodon.gougere.fr

      First time I see signatures with a validity period of only a few minutes…

      mastodon.gougere.fr/@bortzmeye

        Fred de CLX boosted

        [?]Stéphane Bortzmeyer » 🌐
        @bortzmeyer@mastodon.gougere.fr

        And this log can now be queried through mastodon.gougere.fr/@DNSresolv

        (and with authentication)

        Built with the excellent Go DNS library github.com/miekg/dns

          Fred de CLX boosted

          [?]Stéphane Bortzmeyer » 🌐
          @bortzmeyer@mastodon.gougere.fr

          For , the domain crate can use different crypto backends such as the ring crate or the bindings. (But there are more.)

          There is now a common-line tool to query the DNS, dnsi. And a CLI tool to do misc. manipulations, dnst ("people are using the ldns library example programs in production"). And a key manager, keyset.

            [?]Stéphane Bortzmeyer » 🌐
            @bortzmeyer@mastodon.gougere.fr

            We start with : last news of the domain crate.

            First big user of this library is , the signer.

              [?]JP Mens » 🌐
              @jpmens@mastodon.social

              I wrote up something along these lines a few years ago using terminology from a presentation I had admired. Not specifically bound (pun!) to BIND9.

              jpmens.net/2022/09/22/dnssec-s

                [?]JP Mens » 🌐
                @jpmens@mastodon.social

                This article describes how to configure and operate BIND 9 with an offline KSK. Offline KSK was introduced in BIND 9.20.2, with support for KSK rollover in this mode added in 9.20.4

                kb.isc.org/docs/dnssec-signing

                  Remi Gacogne boosted

                  [?]PowerDNS » 🌐
                  @PowerDNS@fosstodon.org

                  JP Mens boosted

                  [?]PowerDNS » 🌐
                  @PowerDNS@fosstodon.org

                  [?]John Shaft » 🌐
                  @shaft@piaille.fr

                  Remi Gacogne boosted

                  [?]PowerDNS » 🌐
                  @PowerDNS@fosstodon.org

                  JP Mens boosted

                  [?]PowerDNS » 🌐
                  @PowerDNS@fosstodon.org

                  [?]Stéphane Bortzmeyer » 🌐
                  @bortzmeyer@mastodon.gougere.fr

                  RFC 9824: Compact Denial of Existence in DNSSEC

                  Ce permet à un nom de domaine d'être à la fois existant et non-existant. Plus précisément, il permet de fournir une preuve cryptographique avec , prouvant que le nom existe (alors qu'il n'existe pas) mais n'a pas les données demandées. Cette technique est particulièrement adaptée au cas des signatures dynamiques, mais a l'inconvénient de « mentir ».

                  bortzmeyer.org/9824.html

                    [?]Dryusdan » 🌐
                    @Dryusdan@social.dryusdan.fr

                    Partage, veille et lecture : A Minimum Complete Tutorial of DNSSEC https://metebalci.com/blog/a-minimum-complete-tutorial-of-dnssec/ A small but complete tutorial of how DNSSEC works. #dns #DNSSEC #Shaarli https://dryusdan.link/shaare/4Z7VtQ

                      JP Mens boosted

                      [?]PowerDNS » 🌐
                      @PowerDNS@fosstodon.org

                      JP Mens boosted

                      [?]PowerDNS » 🌐
                      @PowerDNS@fosstodon.org

                      PowerDNS Security Advisories 2025-07 and 2025-08

                      a.k.a PowerDNS Recursor 5.1.9, 5.2.7 and 5.3.3 Released

                      blog.powerdns.com/2025/12/08/p

                        [?]Stéphane Bortzmeyer » 🌐
                        @bortzmeyer@mastodon.gougere.fr

                        @gregr Hmmm, DNSviz dnsviz.net/d/hlaor.realtor/aTE et Zonemaster zonemaster.fr/en/result/4a6779 ne voient pas de problème non plus. Il faut les accuser de laxisme ?

                        [?]John Shaft » 🌐
                        @shaft@piaille.fr

                        TLDs using (algorithm 15) for :

                        - .fj (Fiji)
                        - .pg (Papua New Guinea)
                        - .ml (Mali)

                          opio ⏚ boosted

                          [?]John Shaft » 🌐
                          @shaft@piaille.fr

                          RE: mastodns.net/@diffroot/1156577

                          Mali going secure!

                          Third TLD to use . Second one to publish its first DS directly with this algorithim

                          \o/

                          (poke @camille )

                          John Shaft boosted

                          [?]Tootzonechanges » 🤖 🌐
                          @diffroot@mastodns.net

                          🇲🇱 ml. : Going secure - Added new DS
                          + 21942 15 2

                            JP Mens boosted

                            [?]PowerDNS » 🌐
                            @PowerDNS@fosstodon.org

                            [?]John Shaft » 🌐
                            @shaft@piaille.fr

                            Now that RFC 9905 has been published it's time to check if there are still TLDs using the deprecated algorithm 5 and 7 '.

                            $ dig +tcp @\c.root-servers.net axfr . > root.zone
                            $ grep -P 'IN\tDS' root.zone | grep ' 5 ' | wc -l
                            0
                            $ grep -P 'IN\tDS' root.zone | grep ' 7 ' | awk '{ print $1}' | sort -u | idn2 -d
                            gd.
                            kpn.
                            la.
                            samsung.
                            삼성.
                            پاکستان.
                            ລາວ.

                            Aaaaand... Still seven domains using RSASHA1-NSEC3-SHA1

                              [?]Jan Wildeboer 😷:krulorange: » 🌐
                              @jwildeboer@social.wildeboer.net

                              Ultimately I'd prefer a more decentralised system with a "n out of m" architecture. With more than one root key holder, geographically and politically distributed, where you (as user) can declare which root keys you trust. But that is a more complicated discussion for another time. Having one Ceremony Room and the respective amount of key holders that are NOT under US jurisdiction seems to be an achievable and justified goal, in my personal opinion

                              3/3

                                [?]Jan Wildeboer 😷:krulorange: » 🌐
                                @jwildeboer@social.wildeboer.net

                                I very well remember the discussions on this question when DNSSEC was introduced back in the days. And while the current system has served us all well in the past years, this fundamental question remains. And now that we have a more complicated world, we should recognise that this is a centralised element that is under the sole jurisdiction of one country that has moved towards more exclusionary, maybe even discrimintaory policies.

                                2/3

                                  AodeRelay boosted

                                  [?]Jan Wildeboer 😷:krulorange: » 🌐
                                  @jwildeboer@social.wildeboer.net

                                  I hope there are some discussions on either moving one of the Ceremony Rooms (AKA Key Management Facilities) to another region/country or maybe add one more outside of the US. Having the responsibility for the DNSSEC root key material in one single country under more and more untrustworthy leadership looks like a risk to me that should be addressed. My personal preference would be a Ceremony Room on UN properties in Geneva.

                                  1/3

                                  technotes.seastrom.com/2025/11

                                  Slide 15 of the slide deck A BRIEF PRIMER ON MANAGING THE KEYS TO THE INTERNET by DAVID HUBERMAN, ICANN’s OFFICE OF THE CTO, showing the location of the two ceremony rooms. One is in Culpeper, Virginia, teh  other one is in El Segundo, California. Slidedeck available at https://technotes.seastrom.com/assets/2025-11-23-passing-the-torch/2-David-Huberman_DNS-security-and-the-Root-DNSSEC-KSK-Ceremony.pdf

                                  Alt...Slide 15 of the slide deck A BRIEF PRIMER ON MANAGING THE KEYS TO THE INTERNET by DAVID HUBERMAN, ICANN’s OFFICE OF THE CTO, showing the location of the two ceremony rooms. One is in Culpeper, Virginia, teh other one is in El Segundo, California. Slidedeck available at https://technotes.seastrom.com/assets/2025-11-23-passing-the-torch/2-David-Huberman_DNS-security-and-the-Root-DNSSEC-KSK-Ceremony.pdf

                                    [?]John Shaft » 🌐
                                    @shaft@piaille.fr

                                    🫡

                                    'Zohran' sign meme: DNSSEC for every domain

                                    Alt...'Zohran' sign meme: DNSSEC for every domain

                                      [?]Stéphane Bortzmeyer » 🌐
                                      @bortzmeyer@mastodon.gougere.fr


                                      Ce matin, si vous avez testé, un de mes domaines personnels, bortzmeyer.fr, présentait des problèmes . Que s'est-il passé ? Était-ce de ma faute ? Va t-on tous mourir ?

                                      bortzmeyer.org/dnssec-panne-pe

                                        Remi Gacogne boosted

                                        [?]PowerDNS » 🌐
                                        @PowerDNS@fosstodon.org

                                        Pep boosted

                                        [?]Stéphane Bortzmeyer » 🌐
                                        @bortzmeyer@mastodon.gougere.fr

                                        Le rappel du jour que, si vous faites du , il n'est pas indispensable d'avoir ZSK et KSK. Une seule clé, c'est parfaitement possible et sûr. dnsviz.net/d/xn--potamochre-66

                                          e-Jim 🖧 boosted

                                          [?]Stéphane Bortzmeyer » 🌐
                                          @bortzmeyer@mastodon.gougere.fr

                                          J'ai déjà parlé de , un logiciel de @nlnetlabs actuellement en développement, qui automatise un certain nombre de tâches nécessaires pour comme la re-signature ou le remplacement des clés. Le projet avance vite donc voyons quelques nouveaux essais.

                                          bortzmeyer.org/cascade-deux.ht

                                          @alexband

                                            [?]John Shaft » 🔓
                                            @shaft@piaille.fr

                                            Thanks to @diffroot, we can see that .pg wasn't using until last April. .pg is thus the 1st TLD to implement DNSSEC directly with ed25519

                                            mastodns.net/@diffroot/1144008

                                              [?]John Shaft » 🌐
                                              @shaft@piaille.fr

                                              Yay, another using algorithm 15 (ed25519) for its KSK : .pg! (Papua New Guinea 🇵🇬)

                                              (Other one being .fj :) )

                                              piaille.fr/@shaft/115422575883

                                                [?]PowerDNS » 🌐
                                                @PowerDNS@fosstodon.org

                                                PowerDNS Security Advisory 2025-06
                                                (aka PowerDNS Recursor 5.1.8, 5.2.6 and 5.3.1 released)

                                                blog.powerdns.com/powerdns-sec

                                                  [?]Stéphane Bortzmeyer » 🌐
                                                  @bortzmeyer@mastodon.gougere.fr

                                                  Plaignons toustes ensemble le nouveau Bureau d'Enregistrement de mes noms de domaine, que j'assomme avec plein de tickets.

                                                  [?]Ludovic :Firefox: :FreeBSD: » 🌐
                                                  @usul@piaille.fr

                                                  In the recent ICANN Registrations Operation Workshop 30th September 2025, the
                                                  following data was shared about DNSSEC Validation Rates

                                                  - Region / Rate / Increase since 2023
                                                  - Asia 32% +4%
                                                  - Oceania 54% +11%
                                                  - Africa 46% +15%
                                                  - Americas 37% +4%
                                                  - Europe 48% +8%

                                                    0 ★ 3 ↺
                                                    victor héry boosted

                                                    [?]oldsysops » 🌐
                                                    @oldsysops@social.dk-libre.fr

                                                    Have a question on DNSSEC KEY rollover (and bind).
                                                    If i set up inline-signing and dnssec-policy on a zone, the key will rollover automatically ?
                                                    I've just to put the DS record once, and it will rotate without an issue ?


                                                      [?]Stéphane Bortzmeyer » 🌐
                                                      @bortzmeyer@mastodon.gougere.fr

                                                      Changer de BE (Bureau d'Enregistrement), cela implique quoi en pratique ? Un récit très détaillé et très bien vu d'un titulaire qui veut échapper aux augmentations de tarif de Gandi shaarli.guiguishow.info/?hCft1