What DNS servers are you currently using?
Trying to decide which ones to enable on my Pi-hole...
What DNS servers are you currently using?
Trying to decide which ones to enable on my Pi-hole...
Multiple domains leveraging #DNS #tunneling have been probing the Internet for public IPv4/IPv6 resolvers. Lacking TXT/PTR records, the associated DNS traffic is highly suspicious. These #scans began in Jan 2025 and peaked earlier this week. More info at https://bit.ly/4iibcTF
I have been running the new Android #DNS app by @quad9dns for just a few hours and already found one bad offender. My Garmin watch face was phoning home to Dubai several times per hour to https://pay-to-use.com/
I observed the Zoom outage yesterday in real time when my wife couldn't connect to a meeting and called me in to help troubleshoot. While I didn't do any deep troubleshooting, when I noticed Zoom's main website was also down, I figured there were only a few classes of issue that could cause that kind of outage, DNS being the first.
It turns out it was not only DNS, but it was a Registrar<->TLD issue apparently completely outside of Zoom's control. Scary.
https://www.theregister.com/2025/04/17/zoom_outage_godaddy_blamed/
Some good news for today: demonstrable improvements in addressing DNS abuse.
https://www.sidn.nl/en/news-and-blogs/icanns-anti-abuse-measures-look-to-be-having-the-desired-effect
Thanks @index for including this in the newsletter! Always nice to see something positive.
At our 25th year anniversary party, we asked friends to deliver talks about a subject they are passionate about outside of work #DNS, #routing, #foss, ..
Mirjam gave a talk about #ArtBrut/Outsider Art, which was very well received. Now, one of the collections she talked about, the Collection Prinzhorn, that preserved art even through WWII, is now at risk.
She asked us to raise awareness, and we are inspired to help. Care? Donate or join their association of friends https://www.freundeprinzhorn.de/index-en.html
We've told many of users to "stay tuned" for news on our #Android app - well, here it is!
Quad9 Connect is now available on F-Droid! If you're new to #FDroid check out our blog post for more information!
https://www.quad9.net/news/blog/quad9-connect-now-on-f-droid/
#dnscap v2.3.0 released!
- New output format `tcpdns`
- New plugin `asudp`
- Added support for DLT_LINUX_SLL2
and fixes...
^JL
#DNS #Capture #PCAP #OpenSource
https://github.com/DNS-OARC/dnscap/releases/tag/v2.3.0
correct HTTPS (SVCB) record support is still a distant dream for Firefox and chrome. So #AWS adding static IPs to cloudfront will be welcome for many customers.
Natch AWS mangles #DNS terms in the announcement, but the feature is good anyways.
https://aws.amazon.com/about-aws/whats-new/2025/04/amazon-cloudfront-anycast-static-ips-apex-domains/
Meine Datenschutz und Privatsphäre Übersicht 2025, für die Allgemeinheit
Teilen erbeten
als PDF:
https://cryptpad.digitalcourage.de/file/#/2/file/pIOSst7Z53pFECyng-lX9LlQ/
#DSGVO #TDDDG ( #unplugtrump )
#Datenschutz #Privatsphäre #sicherheit #Verschlüsselung
#encryption #WEtell #SoloKey #NitroKey #Email #Cybersecurity #Pixelfed #Massenűberwachung
#Google #Metadaten #WhatsApp #Threema #Cryptpad #Signal
#Hateaid #Cyberstalking #Messenger #Browser #Youtube #NewPipe #Chatkontrolle #nichtszuverbergen #ÜberwachungsKapitalismus #Microsoft #Apple #Windows #Linux #Matrix #Mastodon #Friendica #Fediverse #Mastodir #Loops #2FA #Ransomware #Foss #VeraCrypt #HateAid #Coreboot #Volksverpetzer #Netzpolitik #Digitalisierung #FragdenStaat #Shiftphone #OpenSource #GrapheneOS #CCC #Mail #Mullvad #PGP #GnuPG #DNS #Gaming #linuxgaming #Lutris #Protondb #eOS #Enshittification
#Bloatware #TPM #Murena #LiberaPay #GnuTaler #Taler #PreppingforFuture
#FediLZ #BlueLZ #InstaLZ #ThreatModel
#FLOSS #UEFI #Medienkompetenz
So an update pushed out to stuff.co.nz over the last couple of days has made it pretty much unusable due to additional tracking/surveillance capitalism. Links from front page are not fetchable anymore if you sanitize #DNS / cookies etc #NewZealand #media usual agent switching techniques don't fix it - and it does it across the three browsers I tested.
“Your device has been blocked due to illegal activity” — sure it has. After fat-fingering github[.]com, we were redirected to a domain running a fake Microsoft tech support scams: pop-ups that lock your browser, shout scary messages, and push you to call a “support” number (aka the scammer who’ll walk you through installing remote access tools).
They're hosted on legit infra like Azure blobs or Cloudflare Pages. That one redirect led to uncovering 1,200+ other domains hosting identical fake support pages. Of course, whenever a redirect like this happens, there's a malicious traffic distribution system (TDS) involved.
Examples include:
- tenecitur.z1.web.core.windows[.]net
- neon-kleicha-36b137[.]netlify[.]app
- us6fixyourwindowsnow[.]pages[.]dev
- microsoft-coral-app-6xv89.ondigitalocean[.]app
#dnsjit v1.5.0 released!
- Added `Label.torfc1035()`
- Added support for DLT_LINUX_SLL2
- Fixed UDP & IP packet padding calculations
^JL
#DNS #Lua #Script #LuaJIT #OpenSource
https://github.com/DNS-OARC/dnsjit/releases/tag/v1.5.0
We’re seeing an increasing volume of blocked queries to the SocGholish-related domain - blackshelter[.]org in the last several days.
More #poser improvements:
* Use arc4random() if available, avoids excessive syscalls just to get high-quality random data
* Add a "resolver" to do #reverse #DNS lookups in a batch, remove the reverse lookup stuff from the connection which was often useless anyways, when a short-lived connection was deleted before resolving could finish
As a result, #swad can now reliably log requests with reverse lookups enabled
Je viens de présenter le #DNS aux collégiens des Cordées de la Réussite :-) https://www.education.gouv.fr/les-cordees-de-la-reussite-permettre-aux-eleves-de-batir-et-de-concretiser-un-projet-d-orientation-306210
How efficient and useful are DNS block lists? I've done it for years but recently found this really cool database and effort providing massive lists, and multiple usecases that ultimately do the same thing. Whether computer, or network wide. There's a few different options.
Here's the page. Totally worth it.
https://github.com/hagezi/dns-blocklists