101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

476
active users

#bind9

0 posts0 participants0 posts today
ꙮ liilliil 🇫🇯🇱🇨🇱🇧<p>Заметил, что <a href="https://mastodon.online/tags/cloudns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudns</span></a> работает с зонами <a href="https://mastodon.online/tags/opennic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opennic</span></a><br>Поэтому уберу-ка у себя с серверов <a href="https://mastodon.online/tags/bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind9</span></a> и воспользуюсь бесплатным их предложением, ибо всякие левые ебланы через меня стали всякие левые домены запрашивать</p>
LeJax<p>Who's manage his <a href="https://mastodon.bsd.cafe/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a>&nbsp;zone files with <a href="https://mastodon.bsd.cafe/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a>?<br>And How?</p><p>I cannot find a clear solution.</p><p>I use <a href="https://mastodon.bsd.cafe/tags/Bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bind9</span></a> and <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/Jails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jails</span></a><br>Any advice are welcome.</p><p>Thanks</p>
Fell<p>Things I learnt about DNS:</p><p>1. You can't "redirect" an entire domain with CNAME, only subdomains, which is why my website has been broken.</p><p>2. You can't specify an AAAA record and use a wildcard for the A record. You have to explicitly put both.</p><p>If the IP changes, you have to change it everywhere. I wonder if there is a modern DNS server which lets you avoid this sort of data duplication. </p><p><a href="https://ma.fellr.net/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://ma.fellr.net/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://ma.fellr.net/tags/Admin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Admin</span></a> <a href="https://ma.fellr.net/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://ma.fellr.net/tags/BIND9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIND9</span></a> <a href="https://ma.fellr.net/tags/BIND" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIND</span></a></p>
Wulfy<p>What's the least <a href="https://infosec.exchange/tags/evil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evil</span></a> <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> provider?</p><p>I've put some of my properties on <a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a>, and I can still hear the boo's.<br><a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> cloud DNS and <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> are no better.</p><p>I can put <a href="https://infosec.exchange/tags/Bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bind9</span></a> on my own <a href="https://infosec.exchange/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> stacks, but I probably lack the uptime for reliability.</p><p>I'm moving away from my CPanel provider into my own <a href="https://infosec.exchange/tags/Selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Selfhosting</span></a> on a <a href="https://infosec.exchange/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a>.</p><p>I'm thinking one NS on something reliable and one on my own stack.</p><p>What does <a href="https://infosec.exchange/tags/masodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>masodon</span></a> hivemind recommend?</p>
Felix Palmen :freebsd: :c64:<p>Adventures getting <a href="https://mastodon.bsd.cafe/tags/Netflix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netflix</span></a> to work in a somewhat complex home <a href="https://mastodon.bsd.cafe/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> 🤯</p><p>I decided to give their plan with ads a chance, sounding like a somewhat fair deal. First issue was, I couldn't even register. It only offered me US plans. Figured that's because my <a href="https://mastodon.bsd.cafe/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> connectivity is tunnelled through <a href="https://mastodon.bsd.cafe/tags/HE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HE</span></a> (for reasons, different story). Of course using an endpoint here in Germany, but nevertheless, Netflix seemed to think it's a US located address.</p><p>Running my own <a href="https://mastodon.bsd.cafe/tags/bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind9</span></a> instance, I found a way to hide relevant AAAA records (netflix' own domain and also amazonws) by adding a view only operating on local loopback and filtering out ALL AAAA records, and then adding forward-only zones for these domains to this local view. Horrible, but works, now I could register, forcing <a href="https://mastodon.bsd.cafe/tags/IPv4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv4</span></a>.</p><p>One particularly cheap "smart-tv" still couldn't connect to netflix, always showing me an error that I was using some "VPN". 🤨 No way to analyze what exactly was happening there, but I finally found a solution for that as well: I created an entirely new network segment (with its own <a href="https://mastodon.bsd.cafe/tags/vlan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vlan</span></a> on the switch). I don't offer IPv6 in this segment at all, and only allow it to access the internet as well as my local <a href="https://mastodon.bsd.cafe/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> server. Putting all tv sets and my <a href="https://mastodon.bsd.cafe/tags/minidlna" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>minidlna</span></a> instance into this segment, everything finally works.</p><p>The nice thing is, I always wanted to isolate the tv sets anyways, and this is now finally done, they're unable to see the rest of my home network! 🥳 Still a bit sad I have to restrict them to IPv4 for now, just to work around netflix' geolocation stuff... 🫤</p>
Forst<p>"Let me quickly try this one <a href="https://mastodon.social/tags/Bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bind9</span></a> thing in <a href="https://mastodon.social/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a>", I thought.<br>No arm64 image. Can't tell if my configuration is bad or if x86 emulation isn't working :/</p>
Petr Menšík :fedora:<p><span class="h-card" translate="no"><a href="https://mastodon.gougere.fr/@bortzmeyer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bortzmeyer</span></a></span> <span class="h-card" translate="no"><a href="https://social.sdf.org/@draeath" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>draeath</span></a></span> <span class="h-card" translate="no"><a href="https://qoto.org/@Shamar" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Shamar</span></a></span> it depends. No stable <a href="https://fosstodon.org/tags/bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind9</span></a> release can forward over DoT (yet). None of them can forward over <a href="https://fosstodon.org/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a> even on the latest commit afaik.</p>
Petr Menšík :fedora:<p><span class="h-card" translate="no"><a href="https://social.sdf.org/@draeath" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>draeath</span></a></span> <span class="h-card" translate="no"><a href="https://qoto.org/@Shamar" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Shamar</span></a></span> no, both <a href="https://fosstodon.org/tags/bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind9</span></a> and <a href="https://fosstodon.org/tags/unbound" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unbound</span></a> implement only server side. They can accept queries over DoH, but cannot forward them to DoH remote server. I am not sure about Knot, but might have the same problem. Forwarding over DoH is rare ability. Dnsdist is one of few capable of it.</p>
IT News<p>Doing DNS and DHCP for your LAN the old way—the way that works - Enlarge / All shall tremble before your fully functional forward and re... - <a href="https://arstechnica.com/?p=2001156" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2001156</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/domainnamesystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>domainnamesystem</span></a> <a href="https://schleuss.online/tags/weekendprojects" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>weekendprojects</span></a> <a href="https://schleuss.online/tags/itprojects" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itprojects</span></a> <a href="https://schleuss.online/tags/features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>features</span></a> <a href="https://schleuss.online/tags/projects" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>projects</span></a> <a href="https://schleuss.online/tags/feature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>feature</span></a> <a href="https://schleuss.online/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind9</span></a> <a href="https://schleuss.online/tags/dhcpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dhcpd</span></a> <a href="https://schleuss.online/tags/bind" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind</span></a> <a href="https://schleuss.online/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a></p>
Petr Menšík :fedora:<p><span class="h-card"><a href="https://infosec.place/users/JerryMouse" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>JerryMouse@infosec.place</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@JerryMouse" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>JerryMouse@infosec.exchange</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@mypdns" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mypdns</span></a></span> <span class="h-card"><a href="https://mastodon.social/@Alonely0" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Alonely0</span></a></span> <span class="h-card"><a href="https://mastodon.social/@floppy_bv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>floppy_bv</span></a></span> no, I mean <a href="https://fosstodon.org/tags/IXFR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IXFR</span></a>. That is incremental zone transfer. <a href="https://fosstodon.org/tags/Bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bind9</span></a> can do it, not sure <a href="https://fosstodon.org/tags/Unbound" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unbound</span></a> has that too. Allows to just receiving changes compared to previous version, but need to store journal containing each change at primary and secondary server. Using AXFR is similar to downloading hosts file over http. I think PiHole uses own modified dnsmasq build, which provides webui integration.</p>
Vftdan<p>How to completely disable DNSSEC in bind9 for exactly one zone?</p><p><a href="https://mastodon.ml/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://mastodon.ml/tags/bind9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bind9</span></a> <a href="https://mastodon.ml/tags/named" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>named</span></a></p>