Tootfinder

Opt-in global Mastodon full text search. Join the index!

@saraislet@infosec.exchange
2025-07-16 20:57:34

"Hackers exploit a blind spot by hiding malware inside DNS records"
Hah! I predicted years ago that attackers would leverage DNS like this!
My insistence to include DNS requests in anomaly detection and threat detection was on point 😤 so vindicated!

@fanf@mendeddrum.org
2025-08-16 11:42:03

from my link log —
Get the location of the ISS using DNS.
shkspr.mobi/blog/2025/07/get-t
saved 2025-07-06

@wyri@toot-toot.wyrihaxim.us
2025-07-16 20:03:07

Alright, next step in my #OTEL adventure for @… was to add react/cache|dns|socket so I can trace any potential connection issues. Not sure yet what to do next:
* Event loop
* react/stream
* Just add tests to what you have before adding more

@AthanSpod@social.linux.pizza
2025-06-16 11:44:26

My main bugbear with OVH is that they *still* don't offer "failover IP" (where you can fairly quickly move an IP between different dedicated servers) for IPv4, not IPV6.
And, no, they don't offer "Bring Your Own IP" for IPv6 either, only for IPv4.
So when I recently migrated us to a new server I had to do the DNS TTL dance with the IPv6 side of things.
Oh, and it's still only a /64 per server. Not that anything stops you from just using <…

@lanefu@social.linux.pizza
2025-07-05 00:46:33

One of the main setbacks to finish my homelab migration from nomad to k8s has been cert-manager compatibility with some of my domains. I didn't want to migrate everything to cloudflare. I've got 2 domains on easydns.com, which isn't supported by cert-manager, but is supported by dns-lexicon.
I found a cert-manager-webhook wrapper around dns-lexicon. Then I forked a fork so that I could tune the build pipeline to produce multi-arch images quickly.
Anyway here…

@grifferz@social.bitfolk.com
2025-08-09 14:32:09

"I just want my life back!"
New from Chuck Tingle. This Summer don't stray too far from the standards track, lest you be…
Pounded in the Ass By the RFC Process
mailarchive.ietf.org/arch/msg/

@drbruced@aus.social
2025-07-25 06:50:01

My latest piece for The Register describes my experience turning on DNS security (easy) and the overall progress on securing DNS across the Internet (poor). theregister.com/2025/07/25/sys

@fluchtkapsel@nerdculture.de
2025-05-30 12:34:57
Content warning: tech, admin, dns

Today, I got notified about spamhaus not responding anymore to requests from our mailserver due to using an "open resolver".
Huh?
I found the command `dig short test.openresolver.com TXT @<ip_of_dns_server_to_test>` to test if my DNS server is deemed an open resolver. And yes, the mailserver uses a DNS server that got recognized as an open resolver.
Out of curiosity, I tried the same in my local network where I have a dnsmasq serving DHCP and DNS for my cli…

@grumpybozo@toad.social
2025-08-03 15:57:54

There's a point here, but it's really narrower than it looks.
Many individuals can self-host to a level that meets their needs. Not everyone needs anti-DDoS on their web server. Not everyone needs 10GB of space for email accessible from any device anywhere. Almost no one needs a global anycast DNS network.

@Captain_Faraday@social.linux.pizza
2025-07-12 14:16:21

So @… blew my mind about how are smart TVs are spying on us with Automatic Content Recognition and other advertising profile scripts. Yikes! Thanks for the heads up!
youtu.b…

A Pi-Hole DNS dashboard styled in the theme of Star Trek: The Next Generation's LCARS computer system showing a lot of statistics of blocked ad queries from home network.
@balaji@social.linux.pizza
2025-08-02 07:12:26

@… I was having issues accessing social.linux.pizza. After racking my brain for a while as to what could have happened, I remembered the old adage "It's always DNS" and indeed it was so.
More specifically, one of the blocklists that Quad9 DNS (which is what I normally use) uses has classified the site as "Botnet" -

@chrysn@chaos.social
2025-06-05 20:17:33

systemd definitely does get many things right. My current favorite is how it sets the system resolver to loopback and provides an own DNS server.
Common Linux tradition was to tell processes to use getaddrinfo, where nsswitch then provides configurable backends. That means that every process goes through loading /etc/nsswitch.conf, but worse, it reduces DNS to a terrible subset. Query SVCB records? tough luck, you're on your own.

@jtk@infosec.exchange
2025-05-23 12:10:11

Take note my #DNS friends
mastodon.social/@pid_eins/1145

@scottmiller42@mstdn.social
2025-06-19 23:54:32

My #CenturyLink DSL Internet is down... except for one computer where I'd previously configured DNS to use Google's Public DNS. I'm assuming this is somehow key to why it still works. I've tried to reproduce this onto another computer, but no luck so far.

A screenshot of my DNS configuration. The text reads as follows:
IP settings
IP assignment: Manual
IPv4 DNS servers: 8.8.8.8
                   8.8.4.4
IPv6 DNS servers: 2001:4860:4860
@hikingdude@mastodon.social
2025-07-30 17:48:18

And the rabbit hole starts: I had to replace my FritzVPN with Wireguard (Thanks @…, of course not Wire*shark) so that the hostname-resolution in my home network works the way I want/need --- IT'S ALWAYS DNS!!!!

@samir@functional.computer
2025-06-03 18:33:18

@… I can think of ways you might do it by getting people to set a DNS CNAME, for example, so they own the domain *but* authentication is controlled by a service. In theory, this allows ownership because you can replace it with a competitor.
AP is probably harder, but I don't think it's impossible, based on my cursory reading of the …

@hacksilon@infosec.exchange
2025-07-02 07:47:59

Update: I heard back from the people running the system. Apparently it isn’t a geoblock, but the specific IPs my requests were coming from were blocked because of abuse from that CDN (bunny.net). The error has been fixed. (Now I wonder if Fraenk hosts their stuff on Bunny.net, or if it’s the DNS resolver I am using 🤔)
Anyway, in the future, access to the warnings should be possible.
Also, they saw this toot and referenced it in their reply 😅.

@lukem@hachyderm.io
2025-06-20 23:39:18

I was wondering why my SMTP configuration wouldn't work. DNS zone looked fine, SSL/TLS settings correct, authentication enabled, yet it wouldn't budge.
Then I had a moment of enlightenment about the mail subdomain having one lone A record instead of two NS records as it should have been.
It's. ALWAYS. DNS. Dammit.

@drbruced@aus.social
2025-07-08 05:13:55

This week I have (a) enabled DNS security extensions (first documented in 1997 in RFC 2065) on a domain I control and (b) enabled IPv6 (first documented in 1995 in RFC 1883) on my home router, so I think it's time to break out "The Dream of the '90s" from Portlandia: youtu.be/TZt-pOc3moc