Tootfinder

Opt-in global Mastodon full text search. Join the index!

@jtk@infosec.exchange
2024-04-26 02:36:29

Microsoft's #Windows #DNS client survey: techcommunity.microsoft.com/t5
They seem particularly interested in responses to various DNS-over-* tech questions.

@deepthoughts10@infosec.exchange
2024-05-26 20:49:42

I talk a lot about blocking certain Internet services such as Dynamic DNS, but I realize that not everyone has a fancy DNS security service or NGFW that gives you an easy way to do this. If you don't have those, but do use Windows DNS, you can create a DNS Policy to create your own #DNS block list by running a simple PowerShell command on your DNS server:
Add-DnsServerQueryResolutionPolicy -Name "BlockListPolicy" -Action IGNORE -FQDN "EQ,*.duckdns.org" -PassThru
#cybersecurity

@grumpybozo@toad.social
2024-06-16 12:52:54

The French will be coming for the rootservers next. That won’t work.
Run your own recursive resolver. It’s easy. It's the way the net was meant to work.
#DNS infosec.exchange/@hotheadhacke

@xtaran@chaos.social
2024-05-17 10:54:25

I just learned about #Postfix's #dnsblog daemon. The name seems a bit misleading. This is not an AI which blogs about DNS topics. 😉 It's the "Postfix DNS allow/denylist logger" and I assume the "blog" comes from "block logger" or so. 🤪

@unixorn@hachyderm.io
2024-05-09 13:59:19

OH on slack:
> Warning: Godaddy silently cut access to their #DNS API unless you pay them more money. If you're using a #Godaddy domain with #letsencrypt or

@jtk@infosec.exchange
2024-04-26 12:57:17

Weekend Reads
* Biography of Tor #Tor #IPv6 #IoT #DNS #Deepfake #RIR

@jtk@infosec.exchange
2024-05-03 15:40:52

Microsoft announces Zero Trust DNS (ZTDNS). My quick, not-so-well-informed take is that it looks RPZ-like, but seemingly specific to Windows environments with all the bells, whistles, and functions that implies.
#DNS

@UP8@mastodon.social
2024-06-13 00:08:00

🎯 Obtaining a locality domain
nguyen.cincinnati.oh.us/locali
#internet #dns

@grumpybozo@toad.social
2024-06-01 14:58:02

Not using free public DNS for #DNSBL queries has been a best practice forever, but they’ve tightened up a lot in the past few years. Using a free DQS account is a good idea even with a local caching recursing resolver, as it allows access to data sets that are not in any open-access list.
#Spam

@schrht@social.linux.pizza
2024-06-17 18:47:31

Is anyone else experiencing #dns issues with #netcup right now?
One of my systems is hosted with them, with their (seemingly) default resolvers in /etc/resolv.conf:
46.38.225.230
46.38.252.230
I was working on the system when suddenly all of my DNS-requests for the subdomains…

@jtk@infosec.exchange
2024-05-24 13:01:12

Weekend Reads
* Rapid DNS zone updates #DNS #IETF #W3C #AI #BGP #SubseaCabling

@grumpybozo@toad.social
2024-06-01 14:58:02

Not using free public DNS for #DNSBL queries has been a best practice forever, but they’ve tightened up a lot in the past few years. Using a free DQS account is a good idea even with a local caching recursing resolver, as it allows access to data sets that are not in any open-access list.
#Spam

@jtk@infosec.exchange
2024-06-09 03:09:45

Sorry not sorry to all attendees who are fans of the #DNS haiku.

@tydalforce@mastodon.world
2024-05-01 19:23:06

fellow geeks....
traceroute bad.horse
and wait for it...
#it #computer #geekHumor #DNS

@jtk@infosec.exchange
2024-05-10 12:42:54

Weekend Reads
* FCC open internet order analysis #FCC #DNS #ICANN #RustLang #DDoS

@jtk@infosec.exchange
2024-05-17 21:05:54

Weekend Reads
* DNS pulse attacks #DNS #TCP #FCC #BGP #ICANN #SSAC

@schrht@social.linux.pizza
2024-06-02 21:35:12

Because I want to make sure that the probability of "It's probably #dns" is high enough I ended up setting up my own nameservers again.
Yes, I don't value my time, why do you ask?