Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices tagged with dns, page 2

  1. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Wednesday, 30-Oct-2019 05:34:00 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    ● NEWS ● #doh ☞ #DNS over #HTTPS Will Give You Back #Privacy that Big #ISPs Fought to Take Away https://www.eff.org/deeplinks/2019/10/dns-over-https-will-give-you-back-privacy-congress-big-isp-backing-took-away
    In conversation Wednesday, 30-Oct-2019 05:34:00 EDT from pleroma.site permalink

    Attachments

    1. DNS over HTTPS Will Give You Back Privacy that Big ISPs Fought to Take Away
      from Electronic Frontier Foundation
      An absurd thing is happening in the halls of Congress. Major ISPs such as Comcast, AT&T, and Verizon are banging on the doors of legislators to stop the deployment of DNS over HTTPS (DoH), a technology that will give users one of the biggest upgrades to their Internet privacy and security since...
  2. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Friday, 25-Oct-2019 08:18:06 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    Dans beaucoup d'organisations, les noms de domaine locaux sont attribués dans un #TLD, un domaine de tête, non normalisé, comme .loc, .corp ou .lan. Pourquoi n'y a t-il pas de domaine de premier niveau normalisé pour ces usages « internes » ?

    https://www.bortzmeyer.org/pas-de-tld-interne.html

    #nomDeDomaine #DNS #ICANN #IETF

    In conversation Friday, 25-Oct-2019 08:18:06 EDT from mastodon.gougere.fr permalink
  3. Dr. Roy Schestowitz (罗伊) (schestowitz@pleroma.site)'s status on Thursday, 24-Oct-2019 06:20:27 EDT Dr. Roy Schestowitz (罗伊) Dr. Roy Schestowitz (罗伊)
    • Dr. Roy Schestowitz (罗伊)
    ● NEWS ● #cloudflare as #surveillance over DoH (think Homer Simpson!) ☞# Encrypted #DNS outside of the US https://eloydegen.com/blog/posts/2019-10-23-dns.html
    In conversation Thursday, 24-Oct-2019 06:20:27 EDT from pleroma.site permalink
  4. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Thursday, 24-Oct-2019 02:16:52 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    "#Comcast Is Lobbying Against Encryption That Could Prevent it From Learning Your Browsing History"

    https://www.vice.com/en_us/article/9kembz/comcast-lobbying-against-doh-dns-over-https-encryption-browsing-data

    #DoH #DNS

    In conversation Thursday, 24-Oct-2019 02:16:52 EDT from mastodon.gougere.fr permalink

    Attachments

    1. Comcast Is Lobbying Against Encryption That Could Prevent it From Learning Your Browsing History
      from Vice
      Motherboard has obtained a leaked presentation internet service providers are using to try and lobby lawmakers against a form of encrypted browsing data.
  5. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Friday, 20-Sep-2019 02:25:59 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer
    • Romain Tartière 😈

    @smortex I've been told (*unconfirmed*) that the authoritative name servers of archive.{is|fo} serve a deliberately different answer to Cloudflare's resolvers (may be for political reasons). #DNS

    In conversation Friday, 20-Sep-2019 02:25:59 EDT from mastodon.gougere.fr permalink
  6. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Monday, 02-Sep-2019 05:29:11 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    A TLD (Top-Level Domain) whose zone file is under a #CreativeCommons licence https://botsin.space/@DNSresolver/102722207488079174

    #DNS

    In conversation Monday, 02-Sep-2019 05:29:11 EDT from mastodon.gougere.fr permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      New status by DNSresolver
      By DNS resolver bot from botsin.space
  7. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Sunday, 18-Aug-2019 15:34:02 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    #DNS, quand il y a des problèmes.

    Ma conf' sur la sécurité des noms de domaines à l'école 42.

    https://sansnom.org/activit%C3%A9s/conf%C3%A9rences/dns-bortzmeyer/

    In conversation Sunday, 18-Aug-2019 15:34:02 EDT from mastodon.gougere.fr permalink
  8. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Monday, 29-Jul-2019 07:14:03 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    « Comment lutter contre le détournement de DNS ? » Un bon article de #Gandi partant de l'attaque contre #MyEtherWallet https://news.gandi.net/fr/2019/07/comment-lutter-contre-le-detournement-de-dns/

    #DNS #nomDeDomaine

    In conversation Monday, 29-Jul-2019 07:14:03 EDT from mastodon.gougere.fr permalink

    Attachments

    1. Comment lutter contre le détournement de DNS ?
      from Gandi News
      Analyse d'un cas de détournement de DNS très médiatisé : Ether
  9. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Thursday, 25-Jul-2019 16:14:21 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    And now IXoT (Incremental zone transfer over TLS) and XoD (zone transfer over DSO). #DNS #acronyms #IETF105

    In conversation Thursday, 25-Jul-2019 16:14:21 EDT from mastodon.gougere.fr permalink
  10. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Thursday, 25-Jul-2019 16:08:33 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    Every #IETF meeting, we invent new acronyms. Now, in the #DPRIVE working group (#DNS #privacy), we hear about XoT (Zone transfer - aXfr - over TLS). #IETF105.

    In conversation Thursday, 25-Jul-2019 16:08:33 EDT from mastodon.gougere.fr permalink
  11. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Monday, 22-Jul-2019 11:55:44 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    Performances of #DoH (#DNS over HTTPS) and #DoT (DNS over TLS). Does it have consequences on user experience?

    DoH (and DoT) can be, in some cases, *faster* than traditional DNS, thanks to the use of TCP.

    #ANRW19 #IETF105

    In conversation Monday, 22-Jul-2019 11:55:44 EDT from mastodon.gougere.fr permalink
  12. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Monday, 22-Jul-2019 11:39:31 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    Oblivious DNS, a protocol for protecting privacy on the #DNS

    Existing privacy techniques do not protect against the resolver. The resolver stills sees everything.

    Solution: encrypted DNS-over-DNS tunnel between the client and the Oblivious DNS server (which pretends to be auth. but is actually the real resolver). It will see the query but not the user, and the default resolver wll see the user but not the query.

    Implemented in Go. Good performances.

    #ANRW19 #IETF105

    In conversation Monday, 22-Jul-2019 11:39:31 EDT from mastodon.gougere.fr permalink
  13. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Monday, 22-Jul-2019 11:24:38 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    7 % AS do it world-wide (17 % in China). So, it is common. Funnily, very often, responses are NOT tampered with.

    Solutions: #DNSSEC validation on the client, encrypted DNS

    #DNS #ANRW19 #IETF105

    In conversation Monday, 22-Jul-2019 11:24:38 EDT from mastodon.gougere.fr permalink
  14. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Monday, 22-Jul-2019 11:24:16 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    #DNS interception: who is answering my queries?

    Internet access providers, governments, antivirus software and of course malware intercept DNS requests and send false replies.

    How to measure its prevalence? Check at the auth. server if there is a request and where does it come from. Careful: interception policy may depend on many things (qtype, TLD in the qname, DNS resolver, etc).

    #ANRW19 #IETF105

    In conversation Monday, 22-Jul-2019 11:24:16 EDT from mastodon.gougere.fr permalink
  15. Stéphane Bortzmeyer (bortzmeyer@mastodon.gougere.fr)'s status on Wednesday, 10-Jul-2019 06:46:35 EDT Stéphane Bortzmeyer Stéphane Bortzmeyer

    Le sachiez-tu ? Le logiciel le plus utilisé pour gérer un ccTLD (domaine national dans le #DNS) se nomme CoCCA et est très international (mais son nom de domaine est un .fr) https://cocca.fr/

    In conversation Wednesday, 10-Jul-2019 06:46:35 EDT from mastodon.gougere.fr permalink
  16. Thomas (tpheine@mstdn.io)'s status on Saturday, 29-Jun-2019 04:27:25 EDT Thomas Thomas

    Hat jemand eine Idee, warum eine #FritzBox die über #VPN rein kommenden Verbindungen nicht über den lokalen #DNS Server mit #Pihole routet? Alle internen Verbindungen laufen komplett über den DNS, nur die via VPN nicht.

    #überfragt #hilfe #AskFediverse #AskMastodon #AskTheFediverse

    In conversation Saturday, 29-Jun-2019 04:27:25 EDT from mstdn.io permalink
  17. Strypey (strypey@mastodon.nzoss.nz)'s status on Sunday, 26-May-2019 05:36:54 EDT Strypey Strypey

    #SyncThing is awesome! I wish I'd got around to installing it years ago, when I first heard about it. It solves the file sync problem proprietary tools like #DropBox solve, and #ownCloud/ #NextCloud aim to replace with #FreeCode. All purely #P2P, with no servers or #DNS required. I'm sharing folders between my laptops and some with a friend back in #Aotearoa (#NZ).

    In conversation Sunday, 26-May-2019 05:36:54 EDT from mastodon.nzoss.nz permalink
  18. infosec-handbook.eu (infosechandbook@mastodon.at)'s status on Thursday, 04-Apr-2019 23:44:19 EDT infosec-handbook.eu infosec-handbook.eu

    Thousands of D-Link routers have been hacked to redirect their DNS traffic:

    https://www.zdnet.com/article/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months/

    – nearly 15,000 D-Link routers are affected, mostly DSL-2640B
    – other affected manufacturers are TOTOLINK, and Secutech
    – hacked routers modify the DNS settings of connected devices to redirect victims to malicious websites

    #dlink #totolink #secutech #router #vulnerability #dsl2640b #infosec #cybersecurity #security #dns #dnschanger

    In conversation Thursday, 04-Apr-2019 23:44:19 EDT from mastodon.at permalink
  19. Sheogorath 🦊 (sheogorath@microblog.shivering-isles.com)'s status on Thursday, 28-Mar-2019 19:25:17 EDT Sheogorath 🦊 Sheogorath 🦊

    There was recently a lot of news about DNS over HTTPS. Some people say it's bad for privacy because it centralizes the DNS requests on Google, Cloudflare and Quad9.

    Time to change that and run your own DNS over HTTPS server. I spend some time today in writing, documenting and arranging a small container setup to allow you to do this:

    https://octo.sh/container-library/dns-over-https/blob/master/README.md

    #DNSoverHTTPS #DoH #Docker #privacy #infosec #selfHosting #DNS

    In conversation Thursday, 28-Mar-2019 19:25:17 EDT from microblog.shivering-isles.com permalink
  20. Strypey (strypey@mastodon.nzoss.nz)'s status on Thursday, 28-Mar-2019 08:55:06 EDT Strypey Strypey
    in reply to
    • ar.al🌻
    • Adrian Cochrane
    • VeintePesos

    Having said that, I agree that supernodes don't have to be as centralized as servers. The #fediverse takes this one step, by connecting standard servers. The next step might be to disaggregate server functions, with some specializing in authentication, or media storage, or search, and so on. But we can't get rid of the concept of servers entirely without giving every device a persistent IP address (#IP6), and creating a decentralized replacement for #DNS.
    @VeintePesos @buoyantair @aral @alcinnz

    In conversation Thursday, 28-Mar-2019 08:55:06 EDT from mastodon.nzoss.nz permalink
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.