For #email configuration and #security check, the European Commission provides a great tool: MECSA https://mecsa.jrc.ec.europa.eu/en/
conclusion: I still have some improvements to implement on my own server
#sysadmin #linux #postfix #DKIM #DMARC #DNSSEC #selfhosting
IPFire protects your DNS requests from being forged by using #DNSSEC
DNSSEC Policy and Key template support in NetBox DNS
https://jpmens.net/2025/03/16/dnssec-policy-and-key-template-support-in-netbox-dns/
System Administration
Week 7, The Domain Name System, Part III
In this video, we try to wrap up our discussion of the Domain Name System by addressing the nature of the root nameservers, looking at various different resource record types, observing reverse lookups, and thinking about how we can have assurance of authenticity and integrity of the #DNS results returned to us via #DNSSEC.
I wrote about #OctoDNS recently (https://jpmens.net/2025/02/22/notes-to-self-on-octodns-and-its-providers/). At the tail end of that post I linked to DNScontrol which I shied away from because "JavaScript".
Later I read a piece by @tobru on how he uses it, slept on that a couple of nights, and that may be a solution to a problem. Here's a screenshot showing what it's capable of. Details might be upcoming in a blog post.
Here creating a zone and keys and #DNSSEC on #PowerDNS as well as #BIND zone master files.
It took a while, but I've finally added .SE to my CDS accuracy tracking proj.
IIS were very helpful.
#dns #dnssec
https://kalfeher.com/analysis/cds-charts/
Have not pay much attention to the Compact Denial of Existence in #DNSSEC yet.
Should have : there are nice straws for the #DNSCamel. :3
Eg. A new optional EDNS0 header flag (CO - for "Compact Answers OK"). Would be the first one since DO.
https://datatracker.ietf.org/doc/draft-ietf-dnsop-compact-denial-of-existence/
Ah bah j'étais persuadé de ne pas avoir finalisé le roulement de #ZSK sur shaftinc.fr mais en fait si : depuis lundi dernier c'était plié
I don't usually post about work-related stuff, but here's something...
The state of DNSSEC on the wider Internet is sad, to say the least. Most large services don't sign their domains and most OSes can't do validation —
"systemd-resolved" can, but not by default.
It looks better regarding encryption at the OS level but, again, not by default.
Combining these two, not even 0.5% of queries are fully protected from tampering.
https://blog.cloudflare.com/new-dns-section-on-cloudflare-radar/
https://radar.cloudflare.com/dns
In addition to global, location, and ASN-level DNS traffic trends on the new DNS page on Cloudflare Radar, we are also providing perspectives on protocol usage, query/response characteristics, and #DNSSEC usage.
Read the announcement blog post at https://blog.cloudflare.com/new-dns-section-on-cloudflare-radar/ and check out the new page at https://radar.cloudflare.com/dns
Mauritius embraces crypto \o/ #DNSSEC
(Algo 8 instead of 13 though)
Nieuwe digitale sloten bij BIT!
We hebben stilletjes de DNSSEC-sleutels van onze authoritatieve nameservers geüpgraded naar kleinere, betere versies. Kleinere handtekeningen, grotere veiligheid.
Meer weten?
https://www.bit.nl/news/3665/293/We-hebben-de-DNSSEC-slotcylinders-geüpgrade-en-nieuwe-sleutels-uitgedeeld
Vanuit de DNS-wereld klinkt nog weleens kritiek op DNSSEC, onder meer vanwege de complexiteit. We bespreken de belangrijkste kritiekpunten en laten zien dat DNSSEC probleemloos ingezet kan worden in grootschalige kritische toepassingen. https://sidn.nl/nieuws-en-blogs/geen-van-grootste-internetdiensten-beveiligd-met-dnssec
#DNSSEC #DNS #SIDN
Does anyone has a contact to the Joint Research Centre (#JRC) [0] or My Email Communications Security Assessment (#MECSA) [1] (both from the #EU)?
I find the tool great... if it would parse #SPF/#IPv6 correctly und actually check for #DNSSEC...
I've tried emailing them, but no response :/
Links:
[0]: https://joint-research-centre.ec.europa.eu/
[1]: https://mecsa.jrc.ec.europa.eu/