NLnet Labs · @nlnetlabs
1712 followers · 617 posts · Server fosstodon.org

Bart van de Velde from Cisco talking about the emerging use of at . In the next release of our free, resolver Unbound, we’ll offer support for DNS-over-QUIC. github.com/NLnetLabs/unbound/p

#quic #ripe86 #opensource #dns #DoQ

Last updated 2 years ago

NLnet Labs · @nlnetlabs
1592 followers · 530 posts · Server fosstodon.org

Our DNS-over-QUIC implementation for Unbound resolver is now ready for review! github.com/NLnetLabs/unbound/p

#dns #DoQ #opensource #openstandards

Last updated 2 years ago

Christian Huitema · @huitema
231 followers · 398 posts · Server social.secret-wg.org

@danwing The attack works by having a pretend client send a forged packet to the server, setting source address and port to the target values, plus using invalid QUIC version. Legit traffic comes from clients (ports > 1024?) and perhaps, rarely, from QUIC servers. It is very unlikely to come from port 53, for example ( specifically says don't do that). Protection could work now. Downside is maybe impeding VN, but we do have a safe alternative for VN: ietf.org/archive/id/draft-ietf

#quic #DoQ

Last updated 2 years ago

Christian Huitema · @huitema
207 followers · 350 posts · Server social.secret-wg.org

@rgacogne @farrokhi I think ( over ) is a good fit for the "recursive to authoritative" traffic, while there is lots of competition in the "stub to recursive" case.

#DoQ #dns #quic

Last updated 2 years ago

NLnet Labs · @nlnetlabs
1547 followers · 487 posts · Server fosstodon.org

Implementing DNS-over-QUIC in Unbound is turning out to be quite an adventure, but we're making good progress! github.com/NLnetLabs/unbound/c

#dns #DoQ #opensource #clang #softwaredevelopment

Last updated 2 years ago

NLnet Labs · @nlnetlabs
1087 followers · 318 posts · Server fosstodon.org

@partim is now giving the entire NLnet Labs team a detailed rundown of the domain crate, setting the stage for our development work for DNS in 2023. Exciting times ahead!

#dns #rust #rustlang #opensource #programming #dot #doh #DoQ #dnssec

Last updated 2 years ago

NLnet Labs · @nlnetlabs
898 followers · 233 posts · Server fosstodon.org

Check out Philip Homburg's draft "Control Options For Client Proxies". It introduces EDNS(0) options that allow a stub resolver to request certain transport and allow the proxy to report capabilities and actual transports that are available. datatracker.ietf.org/doc/draft

#ietf #dns #IETF115 #openstandards #dot #doh #DoQ

Last updated 2 years ago

BitPirate · @bitpirate
32 followers · 221 posts · Server mas.to

@leyrer people are still using DoT? (mandataory: /s)

#DoQ #doh

Last updated 2 years ago

Hal9000 :firefox: :linux: · @halnovemila
140 followers · 604 posts · Server mastodon.uno

RT @Le_Alternative
Una lunga lista di alternative: quali DNS privati utilizzare? Vi proponiamo anche molti DNS per bloccare pubblicità e traccianti!

lealternative.net/2022/07/13/q

#quad9 #NextDNS #dot #DoQ #doh #dnsprivati #adguard

Last updated 3 years ago

Le Alternative · @lealternative
3587 followers · 2534 posts · Server mastodon.uno

Quali DNS privati utilizzare?

Una lunga lista di alternative: quali DNS privati utilizzare? Vi proponiamo anche molti DNS per bloccare pubblicità e traccianti!

LINK --> lealternative.net/2022/07/13/q

#OltreGoogle #adguard #dnsprivati #doh #DoQ #dot #NextDNS #quad9

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6729 followers · 75548 posts · Server mastodon.gougere.fr

RFC 9250: DNS over Dedicated QUIC Connections

Ce nouveau complète la série des mécanismes de protection cryptographique du DNS. Après DoT et DoH, voici , sur . On notera que bien que QUIC ait été conçu essentiellement pour les besoins de HTTP, c'est le DNS qui a été la première application normalisée de QUIC.

bortzmeyer.org/9250.html

#rfc #DoQ #dns #quic

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6729 followers · 75548 posts · Server mastodon.gougere.fr

If you examine your network traffic, runs by default over port 853 (like DNS over DTLS, which nobody ever used).

#DoQ #RIPE84

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6729 followers · 75548 posts · Server mastodon.gougere.fr

And now working group. Let's start with Sara Dickinson presenting (remotely) (DNS over ). DNS over TLS is boring, DNS over HTTPS is too mainstream, let's do it over QUIC. The world needs more protocols for encrypted DNS :-)

#dns #DoQ #quic #RIPE84

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6696 followers · 75526 posts · Server mastodon.gougere.fr

@R1Rail Les trois, tu veux dire, avec :-)

#DoQ

Last updated 3 years ago

Stéphane Bortzmeyer · @bortzmeyer
6407 followers · 75263 posts · Server mastodon.gougere.fr

Current status: reading the mailing list of the working group at : "should we work on [ over QUIC]?"

#quic #ietf #DoQ #dns #dot #doh

Last updated 5 years ago