#nsd — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #nsd, aggregated by home.social.
-
Numerous technical and security improvements on the infrastructure that supports https://mstdn.dk
- DNS simplified extensively by migrating public facing secondary nameservers to #NSD using #CatalogZones from PowerDNS + DNSDist.
- #DNSSEC reenabled
- #ExternalDNS and #CertManager configuration vastly simplified.
- #Ingress controller migrated from #Nginx to #Traefik
Bottom line: https://sikkerpånettet.dk/ now gives the site a 100% #security score. There are still improvements to be made (weirdly enough) - specifically I'm looking into supporting DANE for #TLS certificate signatures in #DNS.
Now that's off the TODO-list :-)
-
I run my own #nameservers or #DNS if you will, and have done so for over 25 years. Initially based on #BIND (aka named) but I later moved to #PowerDNS, There are numerous frontends of varying quality available for PowerDNS. I have opinions on those, but this isn't about them.
For the secondary name servers (in the old and less enlightened days known as slaves) I've always run the same software as the primary. First BIND, then PowerDNS. Recently though, I've been testing out what appears to be a much simpler alternative: #NSD by #Amsterdam based NLnet Labs.
Using #CatalogZones - a new concept to me - I'm able to run secondaries with TSIG notifies and zone transfers as well as fully supported primary signed DNSSEC with a configuration of only 40 lines. No updates needed when adding or removing zones.
For this to work well though, some configuration is required for each zone on the primary. With a little trigger and function magic, this can be automized by the database.
Wheee!
-
Running #OpenBSD 7.8 :openbsd:
DNS: #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
Firewall: #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
Mail: #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
Spam-Defense: #spamd with auto-SPF-walk (no more greylisting issues).
Web: #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).
#Nostr Relay in Rust building...
#SelfHosted #SysAdmin #Security #Privacy -
Running #OpenBSD 7.8 :openbsd:
DNS: #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
Firewall: #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
Mail: #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
Spam-Defense: #spamd with auto-SPF-walk (no more greylisting issues).
Web: #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).
#Nostr Relay in Rust building...
#SelfHosted #SysAdmin #Security #Privacy -
Running #OpenBSD 7.8 :openbsd:
DNS: #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
Firewall: #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
Mail: #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
Spam-Defense: #spamd with auto-SPF-walk (no more greylisting issues).
Web: #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).
#Nostr Relay in Rust building...
#SelfHosted #SysAdmin #Security #Privacy -
Running #OpenBSD 7.8 :openbsd:
DNS: #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
Firewall: #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
Mail: #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
Spam-Defense: #spamd with auto-SPF-walk (no more greylisting issues).
Web: #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).
#Nostr Relay in Rust building...
#SelfHosted #SysAdmin #Security #Privacy -
Running #OpenBSD 7.8 :openbsd:
DNS: #nsd (3 Master Zones), #DNSSEC & #DANE (RFC6698) + #unbound
Firewall: #pf with auto-fed tables (IPS-style), spambot-tarpitting & service rate limits.
Mail: #smtpd (Multi-domain, RFC8461/MTA-STS) + #rspamd (DKIM) + #dovecot (IMAPS-only).
Spam-Defense: #spamd with auto-SPF-walk (no more greylisting issues).
Web: #relayd (TLS-Terminator, HSTS, CSP) + #httpd (NIP-05, Autoconfig, security.txt).
Performance: Lightweight "Fail2Ban" via 1-liner shell script (No Python crap!).
#Nostr Relay in Rust building...
#SelfHosted #SysAdmin #Security #Privacy -
The final countdown!
ONE hour left of our #CyberMonday sale on Horns247
With #NSD and the transfer portal right around the corner, NOW is the time to join for 75% off!
https://secure.247sports.com/college/texas/join/?promo=JOIN #HookEm
-
Punjabi Film “Rajdhani Punjab” to Expose the Dark Underworld of the Drug Trade — In True Hollywood Style.
https://aliyesha.com/sub/articles/news/display/pb_punjabi_movie_rajdhani_punjab
#punjab #chandigarh #india #news #press #Punjbai #RajdhaniPunjab #PunjabiCinema #YograjSingh #NSD #NationSchoolOfDrama #IndianFilms #PunjabiFilmIndustry #CinemaNews #DrugFreePunjab #NewRelease #RegionalCinema #Drugs #Addiction
Enjoy tracker free reading with us. #privacy #privacymatters
-
what #disroot, #systemli, and #riseup did that made me build a similar collective. currently running some services under #openbsd from #indonesia:
- #prosody (#xmpp server)
- #dovecot, #opensmtpd, #rspamd (email server)
- openbsd environemnt (through ssh)
- nginx (web server)
- #unbound, #nsd (#dns server)
but, i ponder what i must do to pass the #security and perfomance standard.
can someone answer my question? i appreciate it so much
-
The overlap of people trying to self-host authoritative DNS with nsd and integrate it with kubernetes via external-dns and cert-manager is extremely low.
-
ServerSocket на Android в пределах одной сети
Продолжая серию статей, общения между процессами и между двумя приложениями , в заключительной части разберем примеры в пределах одной Wi-Fi ‑сети. Рассмотрим, как с помощью ServerSocket можно организовать взаимодействие между устройствами, будь то обмен данными, совместная работа или создание многопользовательских игр. Если в предыдущих частях мы рассматривали конкретные способы создания сервера и общение с помощью разных протоколов, в этот раз покажу, как зарегистрировать свой сервер и находить чужие серверы в сети.
-
I wrote a new blog post about DNS (part 1)!
Learn how DNS works in more depth and I even provide you will some useful terminal commands you can try yourself:
https://blog.melroy.org/2025/dns-part-1/
#dns #security #linux #unbound #bind #linux #recursive authoritative# server #nsd #dig #zone #domain #name #system
-
I added a new service in my self-hosting:
a DNS server with adblock support powered by NSD, Unbound, and AdGuard Home
-
NEW:
"Colorado is definitely the team to beat."
Why #NCAA
recruiting experts can't stop seeing Georgia star Julian Lewis as Deion Sanders' next star Colorado Buffs QB, up now from The @DenverPost:denverpost.com/2024/11/18/s...
-
#Montenegro
Presidente Jakov #Milatović: "Il Presidente dell'Assemblea Andrija #Mandić (#NSD|Minoranza serba) si è recato ad un'esercitazione militare dell'esercito serbo. I cittadini chiedono che risponda ad una domanda legittima, ovvero in quale formato e contesto ha partecipato all'esercitazione di ieri. Ricordo che Mandić è membro del Consiglio per la difesa e la sicurezza e il Montenegro è un Paese della #NATO". -
I decided to add #DoQ support to my check_soa script (because it's easy to add as #dnspython supports it pretty much out of the box) so I'm looking for #DNS zones using authoritative nameservers accessible with DoQ. Does anyone knows any?
I know a few recursive servers using #QUIC but I haven't found authoritative servers yet :/
(I'd love to have some myself (my NS can be already be queried using #DoT) but I use #NSD (which has no QUIC support yet) and Debian so...)
-
Iscrivetevi, saremo insieme per tre giorni!
http://school.namex.it/
#DNS #DNSSEC #PRIVACY #RFC #CENSORSHIP #NSD #UNBOUND #SOAN -
#Montenegro #Serbia
Ministro degli Esteri Filip #Ivanović (#PES|Centro anti-corruzione): "#Mandić (#NSD|Minoranza serba) non rappresentava il Montenegro nella sede elettorale dell'#SNS|EPP. Il governo, che si è formato con una maggioranza parlamentare, è fondato sulla base di un accordo di coalizione chiaro e preciso. Questo è stato firmato da tutti i componenti di quella maggioranza e il programma di lavoro è dettato dal Primo Ministro." -
#Montenegro #Serbia
Comitato Centrale #URA|G/EFA: "È inaccettabile che Andrija #Mandić (#NSD|Minoranza serba), in qualità di Presidente del Parlamento del Montenegro e rappresentante di tutti i parlamentari e cittadini, sia presente alla sede elettorale di un partito in un altro Paese. La responsabilità di questo evento è del Primo Ministro Milojko #Spajić (#PES|Centro anti-corruzione), dal quale il pubblico si aspetta una dichiarazione al riguardo." -
🎉 Exciting news! We just released our own PTR daemon!
Now you can control your PTR directly from your VM with a simple http request 💻. Check out our website for all the details: https://openbsd.amsterdam/ptr.html
-
@tolstoevsky Не обязательно #BIND9 aka #BIND, его много критикуют. Есть ещё #KnotDNS, #YADIFA и другие; а если не нужен #AXFR (все вторичные сервера свои, синхронизируются #rsync'ом), то #gdnsd (#NSD, по-моему, только для больших нагрузок, а на малых не уменьшает потребление памяти). Есть ещё маленький и экономичный #MaraDNS, но там надо изучать другой синтаксис файла зоны.
-
@tolstoevsky Не обязательно #BIND9 aka #BIND, его много критикуют. Есть ещё #KnotDNS, #YADIFA и другие; а если не нужен #AXFR (все вторичные сервера свои, синхронизируются #rsync'ом), то #gdnsd (#NSD, по-моему, только для больших нагрузок, а на малых не уменьшает потребление памяти). Есть ещё маленький и экономичный #MaraDNS, но там надо изучать другой синтаксис файла зоны.
-
@tolstoevsky Не обязательно #BIND9 aka #BIND, его много критикуют. Есть ещё #KnotDNS, #YADIFA и другие; а если не нужен #AXFR (все вторичные сервера свои, синхронизируются #rsync'ом), то #gdnsd (#NSD, по-моему, только для больших нагрузок, а на малых не уменьшает потребление памяти). Есть ещё маленький и экономичный #MaraDNS, но там надо изучать другой синтаксис файла зоны.