#DNSSec

2025-06-18

Mongolia's IDN TLD, мон., just switched from the very old algorithm 5 (RSA-SHA1) to elliptic curves \o/

#DNSSEC

mastodns.net/@diffroot/1147064

2025-06-17

Identity digital rolling keys after delegation change. There’s no going back now.
#dns #dnssec
mastodns.net/@diffroot/1147007

Stéphane Bortzmeyerbortzmeyer@mastodon.gougere.fr
2025-06-17
2025-06-13

also available in English:
Extended DNS Errors used in DNS software and services -- Modern, standardised function call for user applications still needed
sidn.nl/en/news-and-blogs/exte

The Extended DNS Errors (EDE) introduced by RFC 8914 seem to be a useful addition to the DNS protocol.
However, there’s still a need for a new or extended function call to enable (stub) resolvers to relay EDE error codes to user applications that send them queries.

#DNS #DNSSEC

2025-06-13

op SIDN.nl:
Extended DNS Errors vinden toepassing in DNS-software en -diensten -- Moderne, gestandaardiseerde functie-call voor gebruikersapplicaties ontbreekt nog
sidn.nl/nieuws-en-blogs/extend

De Extended DNS Errors (EDE) die RFC 8914 introduceerde blijken een belangrijke toevoeging aan het DNS-protocol.
Wat nog ontbreekt is een nieuwe of uitgebreide functie-call waarmee (stub) resolvers EDE-foutcodes aan hun aanroepende gebruikersapplicatie kunnen doorgeven.

#DNS #DNSSEC

2025-06-13

I've noticed that in recent days the `LI` domain has crept up over 10% errors when querying signed domains. It's about 10.2% which is significantly higher than other Top Level Domains
It isnt in my top ten list so I don't publish the results on my report page. I have the data tho.

If you're associated with the TLD I'd love to hear if you have any thoughts on why.

kalfeher.com/analysis/cds-char

#dns #dnssec

2025-06-13

And yes, it works! Here are #DNSSEC keys in the YubiHSM, created via PKCS#11 using kmip2pkcs11 with KMIP queries sent by domain KMIP key code.

The goal for this approach is to shield an application against an untrusted PKCS#11 library.

#DNS #OpenSource #rustlang.

Four DNSSEC keys in a YubiHSM
2025-06-13

Little Friday shout-out to @andreas for setting us up with a YubiHSM so we can test our KMIP and PKCS#11 code for our #DNSSEC signer Nameshed. 💚 Thanks a lot for supporting #OpenSource! #DNS #rustlang github.com/NLnetLabs/kmip2pkcs

Ronin Kenshoroninkensho
2025-06-11

Yes! I have working, based on a manually configured DS/DNSKEY-record in my TLD-zone! All other records managed through nameservers which I can highly recommend.

2025-06-11

@jpmens We’d love to add more functionality to `dnst` by adding a drop-in replacement for `ldns-verify-zone` and include new functionality to make it comparable to validns, if desired.

As it stands, offering a prototype for Nameshed has our priority now, so that we can release a production grade #DNSSEC signer later in the year.

That being said, perhaps one of the developers needs to scratch an itch over the summer. 😉

#DNS #OpenSource #rustlang github.com/NLnetLabs/dnst

2025-06-10

At the ICANN83 DNSSEC And Security Workshop, we presented the flexible key management we have designed for our new #DNSSEC signing solution Nameshed. Philip explains how we avoid loading an unknown shared library into the signer process and how we keep track of state. #DNS #OpenSource #rustlang Slides: static.sched.com/hosted_files/

Dr. David McBride (dwm)dwm
2025-06-09

Anyone with more DNSSEC foo than me, is the delegation from `uk.` to `ac.uk.` broken right now?

e.g. dnsviz.net/d/www.cam.ac.uk/dns


Screenshot from dnsviz.net showing a BOGUS delegation from uk. to ac.uk.
2025-06-09
Meet Tamás Csillag at #ICANN83!
We’re excited to be in Prague from 9–12 June 2025. Let’s connect and talk all things DNS! See you there! 😉
#DNS #Anycast #DNSSEC #Peering #IXP
Kevin Karhan :verified:kkarhan@infosec.space
2025-06-09

@mnordhoff +1 IDK how @jerry does #DNSSEC. Personally I use #ClouDNS where this is a two-click operation...

J'ai profité de devoir quitter #Njalla pour activer #DNSSEC pour mes noms de domaines.

2025-06-07

Bei #INWX ist #DNSSEC nur einen klick weg. 😉

2025-06-07

there were zero changes to the root zone
mastodns.net/@diffroot/1146387
looks like afilias/donuts/ident-dig taking on a portfolio from ultra/neustar/vercara/digicert
#dns #dnssec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst