Re: [dns-operations] Stunning security discovery: AXFR may leak information

2015-04-14 Thread Jan
I'm not sure this discovery should be dated 2015   http://bugs.cacert.org/view.php?id=803   http://security.stackexchange.com/questions/10452/dns-zone-transfer-attack   http://www.iodigitalsec.com/dns-zone-transfer-axfr-vulnerability/   http://seclists.org/pen-test/2004/Feb/108 Stephane Bortzmeye

Re: [dns-operations] DoH configuration in Chrome

2020-04-14 Thread Jan Schaumann
der-dns.html https://www.chromium.org/developers/dns-over-https That is, I don't think you'll be able to configure it to use your local proxy or another DoH provider. -Jan ___ dns-operations mailing list dns-operations@lists.dns-oarc.net http

[dns-operations] Public resolvers with EDNS Client Subnet

2020-06-24 Thread Jan Včelák
Hello. I'm looking for a list of public resolvers that utilize EDNS Client Subnet when sending queries to authoritative servers. I'm especially interested in the ones that require some kind of opt-in to enable the feature. Is anyone aware of such a list? Thank you. Regards

Re: [dns-operations] Public resolvers with EDNS Client Subnet

2020-06-26 Thread Jan Včelák
ite a burden. This is exactly what I was looking for. I'm wondering if there are more resolver operators with a similar policy. Thank you for sharing the details, Brian. -- Jan ___ dns-operations mailing list dns-operations@lists.dns-oarc.net

Re: [dns-operations] Public resolvers with EDNS Client Subnet

2020-06-26 Thread Jan Včelák
Thank you all for sharing the ideas. >> https://dnsthought.nlnetlabs.nl/does_ecs/#top_auth_asns This is very helpful! Thank you, Willem. -- Jan ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/m

[dns-operations] OARC 34 Workshop, February 4th & 5th, Registration and Call for Contributions now open

2020-12-09 Thread Jan Včelák
an 20 minutes (with additional time for questions). **Workshop Milestones:** * 9 Dec 2020 - Submissions open via Indico * 4 Jan 2021 - Deadline for submission (23:59 UTC) * 14 Jan 2021 - Initial Contribution list published * 21 Jan 2021 - Full agenda published * 28 Jan 2021 - Deadline for slides

[dns-operations] OARC 34 Workshop, February 4th & 5th, extending Call for Contributions

2021-01-05 Thread Jan Včelák
Hello everyone. We have extended the Call for Contributions for DNS-OARC 34 until 11 Jan 2021 23:59 UTC (next Monday). If you have a topic our community might be interested in, please, send your proposal as soon as possible. We haven't received a lot of proposals during holidays so there is

[dns-operations] OARC 35 Workshop, May 6th & 7th, Registration and Call for Contributions now open

2021-02-19 Thread Jan Včelák
efer to, before, during and after the meeting * you will be expected to attend a rehearsal on April 22nd. It would be very useful to have your slides (even if draft) ready for this. If you have questions or concerns you can contact the Programme Committee: https://www.dns-oarc.net/oarc/progr

[dns-operations] OARC 35 Workshop, May 6th & 7th, Extending Call for Contributions

2021-03-19 Thread Jan Včelák
milestones are: * 25 Mar 2021 - Deadline for submission (23:59 UTC) * 25 Mar 2021 - Initial Contribution list published * 08 Apr 2021 - Full agenda published * 22 Apr 2021 - Deadline for slideset submission and Rehearsal * 06 May 2021 - OARC 35 Workshop Jan Včelák On Fri, Feb 19, 2021 at 3:51 PM Jan

[dns-operations] OARConline 35a Workshop, September 8th, Call for Contributions now open

2021-07-04 Thread Jan Včelák
ehearsal on August 24th. It would be very useful to have your slides (even if draft) ready for this. If you have questions or concerns you can contact the Programme Committee: https://www.dns-oarc.net/oarc/programme via Jan Včelák, for the DNS-OARC Programme Committee OARC depends on spo

[dns-operations] OARConline 35a Registrations and OARC 36 Call for Contributions

2021-08-25 Thread Jan Včelák
estions or concerns you can contact the Programme Committee: https://www.dns-oarc.net/oarc/programme via Jan Včelák, for the DNS-OARC Programme Committee OARC depends on sponsorship to fund its workshops and associated social events. Please contact if your organization is interested in

[dns-operations] OARC 36 Workshop, November 29th & 30th, Extending Call for Contributions

2021-10-04 Thread Jan Včelák
* 29 & 30 November 2021 - OARC 36 Workshop The details for presentation submission are published at the Workshop website: https://www.dns-oarc.net/oarc36 If you have questions or concerns you can contact the Programme Committee: https://www.dns-oarc.net/oarc/programme via Jan V

[dns-operations] Lightning Talks at OARC 36

2021-11-25 Thread Jan Včelák
oarc.net/oarc36>. Thank you and hope to see you soon. Jan Včelák, for the DNS-OARC Programme Committee ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

[dns-operations] DNS over TCP response fragmentation

2023-10-03 Thread Jan Petto
Hello, my name is Jan Petto and I am currently studying computer science at TU Darmstadt, Germany. During the research for my thesis, I have found some odd behavior regarding DNS over TCP, which neither I nor my supervisor can explain. I am hoping somebody here can tell me what I am observing

[dns-operations] NS1 changing compact NSEC for NXNAME

2023-11-07 Thread Jan Včelák
dated once the value for NXNAME is assigned. Please, let me know if you have questions. We expect the change to be deployed in the following weeks. Best regards, Jan Včelák (for NS1, an IBM Company) ___ dns-operations mailing list dns-operations@list

[dns-operations] NS1 updating codepoint for NXNAME

2024-09-08 Thread Jan Včelák
currently planning to deploy the change in the following weeks. Best regards, Jan Včelák (for NS1, an IBM Company) ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Re: [dns-operations] Is it illegal to query the .berlin TLD servers?

2014-01-12 Thread Jan-Piet Mens
> I hope we aren't going to see TXT records containing fatuous legal > disclaimers added to DNS responses in the annoying way that they are > too often used in e-mail... :-) Too late, Chris: $ dig 1.2.+.rp.secret-wg.org txt ;; ANSWER SECTION: 1.2.+.rp.secret-wg.org. 10 IN TXT "3" 1.

Re: [dns-operations] Sharing a DNSSEC key between zones

2015-01-09 Thread Jan-Piet Mens
> I'm looking for resources discussing the pros and cons of sharing > DNSSEC keys between zones. Surfnet published a paper in 2012 which discusses a few drawbacks; I don't recall the exact details, but maybe there's something useful there for you. -JP [1] https://dnssec.surfnet.nl/wp-co

Re: [dns-operations] [Dnssec-deployment] DNSSEC validation failures for .KE

2015-03-31 Thread Jan-Piet Mens
> We have since resolved the issue and domains should be available now. So the issue's resolution consisted in going insecure? I'm not sure I would call that a 'resolution'... > To ensure this does not happen in future we have disable Auto-DNSSec > maintenance and we we will be maintaining DNSS

Re: [dns-operations] calculating DNSSEC keytags in sed (was: RE: calculating DNSSEC keytags in awk)

2015-04-16 Thread Jan-Piet Mens
> $ dig +noall +answer +multi DNSKEY $zone | > > sed -n '/KSK/s/^.*= //p' > if you only want to see the key id of the KSK. If it *has* a KSK; try co.uk. ;-) -JP ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https:

[dns-operations] Spotify contact

2019-10-12 Thread Jan-Philipp Benecke
Hey, is someone from Spotify on this list ? If so, please contact me off list. Your nameservers refusing some PTR lookups. Best, Jan-Philipp ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo

Re: [dns-operations] Why did .KE go insecure?

2022-12-10 Thread Jan-Piet Mens
Yes. I imagine they’ll make an announcement at some point. Two months later I'm still curious; KE. remains insecure [1]. -JP [1] https://dnsviz.net/d/ke/Y5TQvQ/dnssec/ ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https:/

Re: [dns-operations] Strange things at C root name server

2024-05-22 Thread Jan-Piet Mens
Reported to Cogent (ticket HD303751898) but they do not seem to understand that they manage a root name server. Time is fleeting: "GOV zone operational update: DNSSEC transition to algorithm 13" [1] -JP [1] https://lists.dns-oarc.net/pipermail/dns-operations/2024-May/022554.html _

Re: [dns-operations] annoying DDoS attack on ns0.rfc1035.com

2012-06-10 Thread Jan-Piet Mens
> can i interest you in an experimental (thus far) patch to implement > per-{client,response} rate limiting in bind? Tony Finch has been working on query-rate limiting for BIND [1]: > This version of BIND has been modified by Tony Finch at the University > of Cambridge Computing Service to add p

Re: [dns-operations] Why would an MTA issue an ANY query instead of an MX query?

2012-06-10 Thread Jan-Piet Mens
> If that's it, then would asking djb to change its behavior ROFL. Ask DJB to change its behavior? Good luck with that. ;-) -JP ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-op

Re: [dns-operations] paying djb

2012-06-10 Thread Jan-Piet Mens
> Chancellor Merkel hasn't returned my calls even though I offered her > $100tn to fix the Euro crisis. She hangs out at https://twitter.com/Queen_Europe if you want to try again... ;-) -JP ___ dns-operations mailing list dns-operations@lists.dn

Re: [dns-operations] annoying DDoS attack on ns0.rfc1035.com

2012-06-10 Thread Jan Inge Sande
noticed and stopped answering the queries. There were also several addresses targeted at that time. Here's a sample query: fd 35 01 00 00 01 00 00 00 00 00 01 08 62 61 63 0010 6f 6e 64 6e 73 03 62 69 7a 00 00 ff 00 01 00 00 0020 29 23 28 00 00 00 00 00 00 Jan Inge __

Re: [dns-operations] annoying DDoS attack on ns0.rfc1035.com

2012-06-11 Thread Jan-Piet Mens
> Is it possible to determine the home gateway device (CPE) make and model > via SNMP? If they have open DNS proxies they probably have SNMP as well. The CPE I use (Fritzbox -- quite popular in .DE) has no SNMP agent on it (at least not on the not-jailbroken versions :) -JP __

Re: [dns-operations] stop forwarding 1.8MB for 3 lines! was Re: ok, DNS RRL (rate limits) are officially, seriously, cool

2012-06-25 Thread Jan-Piet Mens
> Can we PLEASE stop forwarding those two PNGs totalling 1.8 MB ... particularly since they're not PNG but BMP, which adds insult to injury. -JP ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailma

Re: [dns-operations] A lot of CNAME queries for domain ?

2012-07-05 Thread Jan-Piet Mens
> Looking at it further, it does seem like the source IPs of these queries > are actually fake... as most seem to be consecutive IPs, like such: > > 74.125.126.86 > 74.125.126.85 > 74.125.126.84 > 74.125.126.83 > ... That netblock belongs to Google: NetRange: 74.125.0.0 - 74.125.25

Re: [dns-operations] Minimalistic DNS server for SOA and AXFR

2012-07-17 Thread Jan-Piet Mens
> Actually named does do SOA queries over TCP before AXFR. Zone transfer from BIND 9.9.1 to BIND 9.9.1; logs on master: view internal: query: ww.mens.de IN SOA -E (192.168.1.20) view internal: query: ww.mens.de IN IXFR -T (192.168.1.20) view internal: transfer of 'ww.mens.de/IN': AXFR-style IX

Re: [dns-operations] thoughts on DNSSEC

2012-07-18 Thread Jan-Piet Mens
> How does a prospective customer check a registrar's interface without > doing something approaching reality like registering a throw-away name? He or she may have the bright idea of checking at the TLD. A really marvelous example is to be seen [1] at DENIC, responsible for .DE: Q: "How do I fin

Re: [dns-operations] DNSSEC, IPv6 glue, multiple DNS servers, and eating your own dog food

2012-07-23 Thread Jan-Piet Mens
> > A registrar that does not have DS records for its main domain names > > might lack experience dealing with DNSSEC registrations. > Apologies if this is an obvious thing, but what is the benefit of > publishing a DS record within the zone itself? Shouldn't they be > published within the paren

Re: [dns-operations] Google Public DNS and round robin records

2012-07-23 Thread Jan-Piet Mens
> It is more complicated, specially with DNSSEC validation. Did anyone > try running that on his Android? SIDN Labs experimented with LDNS on iOS and got libUnbound working with validation. [1] -JP [1] http://open.nlnetlabs.nl/pipermail/ldns-users/2012-April/000487.html _

Re: [dns-operations] Google Public DNS and round robin records

2012-07-23 Thread Jan-Piet Mens
> "Dnssec-trigger reconfigures the local unbound DNS server." DNSSEC-Trigger is bundled with Unbound. What it does it to verify that DHCP-obtained forwarders do DNSSEC, updating /etc/resolv.conf to point to the validating Unbound on localhost if not. If neither work, DNSSEC-Trigger attempts to qu

[dns-operations] "Authoritative Name Server" at Wikipedia

2012-08-08 Thread Jan-Piet Mens
>From [1]: "Authoritative Name Server The Authoritative Name Server (ANS) is high-end commercial authority-only DNS server software product from Nominum, a company founded by Paul Mockapetris, the inventor of the DNS. ANS was designed to meet the ne

Re: [dns-operations] go daddy refuses to register NS not otherwise associated with go daddy controlled domains

2012-09-12 Thread Jan-Piet Mens
> $ORIGIN foo.com. > @ IN NS ns.nsservers.com. > IN MX 1 my.email.com. > IN CNAME mysite.hostingprovider.com. No CNAME and other data -- that is illegal. (c.f. [1] :-) -JP [1]: https://twitter.com/dns_borat/status/141872826536837121 ___ dns

[dns-operations] GADS: GNU Alternative Domain Systems

2012-11-06 Thread Jan-Piet Mens
I only just discovered GADS (Gnu Alternative Domain System): "a decentralized, secure name system providing an alternative to the Domain Name System (DNS) for the Internet using memorable names. The system builds on ideas from Rivest's Simple Distributed Security In

Re: [dns-operations] what nameserver software have you been using?

2012-12-14 Thread Jan-Piet Mens
> For mime BIND is always my choice, running BIND 9.7 on debian 6 OS. Time to upgrade then: 9.7 is EOL since a few days ... ;-) [1] > I am just curious what nameservers software have you been using? I think you'll find people here use all sorts of nameserver brands. ISC BIND is one of them, but

[dns-operations] Defending against DNS reflection amplification attacks

2013-02-19 Thread Jan-Piet Mens
FYI, a paper (Feb 2013) titled "Defending against DNS reflection amplification attacks" at [1]. -JP [1] http://www.nlnetlabs.nl/downloads/publications/report-rrl-dekoning-rozekrans.pdf ___ dns-operations mailing list dns-operations@lists.dns-oa

Re: [dns-operations] Clear DNS cache

2013-06-20 Thread Jan-Piet Mens
> the dot com DNS got corrupted for several domains What exactly does that mean? How did it get corrupted, and what was corrupted? Any details? -JP ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mail

Re: [dns-operations] 20130625 survey version.bind

2013-06-27 Thread Jan-Piet Mens
> (don't translate, nsfw) Two perfectly harmless words, at least in a lot of anglo-saxon companies ;) -JP ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs maili

Re: [dns-operations] [Ssh] Re: Is anyone actually using SSHFP records?

2025-02-28 Thread Jan-Piet Mens
Warren, In theory this should be sim… Oh, actually it looks like Jan-Piet has already done this as well: you are digging up histerical^W historical artifacts ... ;-) Beware, that the Action plugin today would likely not run as Ansible has restructured the plugin interface. -JP

Re: [dns-operations] slack.com bogus

2021-09-30 Thread Jan Schaumann via dns-operations
-dns.info/nameservers.txt. 219 resolvers still had DS records: https://pastebin.com/USxsL3g0 (638 said "NO RECORD", 34 SERVFAIL, 1131 timed out.) -Jan --- End Message --- ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https:/

Re: [dns-operations] Testing of SVCB/HTTPS records

2024-04-12 Thread Jan Schaumann via dns-operations
o have the best support (but is still lacking in some parts). On the server side, I did an analysis of use of HTTPS records by domain last year that, if a tangent, may be of interest here, too: https://www.netmeister.org/blog/https-rrs.html -Jan --- End Message --- _

[dns-operations] nih.gov NS only answers TCP queries

2025-03-01 Thread Jan Schaumann via dns-operations
adding it to /etc/hosts :-), but I wouldn't assume that this actually gets to somebody able to fix things. -Jan [1] https://mstdn.social/@rysiek/114089755401568345 [2] https://cyberplace.social/@GossiTheDog/114089601659176174 --- End Message --- ___

Re: [dns-operations] nih.gov NS only answers TCP queries

2025-03-03 Thread Jan Schaumann via dns-operations
--- Begin Message --- Stephane Bortzmeyer wrote: > On Sat, Mar 01, 2025 at 08:44:56PM -0500, > Jan Schaumann via dns-operations wrote > a message of 86 lines which said: > > > It looks like currently the NS for nih.gov only > > respond to TCP queries. > > I

[dns-operations] Why did .KE go insecure? ns36.cdns.net

2022-09-23 Thread Jan-Piet Mens via dns-operations
--- Begin Message --- Out of curiousity, does anybody know why .KE went insecure just after 2022-09-15 18:37Z [1]? They appear to have removed all DNSSEC related data meanwhile [2]. -JP [1] https://dnsviz.net/d/ke/YyNw8w/dnssec/ [2] https://dnsviz.net/d/ke/Yy3YYw/dnssec/ --- End Messag