Re: [dns-operations] cmdns.dev.dns-oarc.net down?

2023-09-05 Thread Jerry Lundström

On 9/5/23 10:06, Christoph wrote:

according to dnsviz it was a DNS issue:


Not really, Check My DNS is a custom DNS/HTTP server and there was no 
indication why it stopped responding. So I just restarted it.


 has also been updated 
with instances and cmdns-cli information.


Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] cmdns.dev.dns-oarc.net down?

2023-09-04 Thread Jerry Lundström

On 9/4/23 14:27, Christoph wrote:

since cmdns.dev.dns-oarc.net appears to be down,


It's up again but I donno what happened, nothing in the logs.

We also have an instance in CA, US: 

And a test/develop instance: 

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNS Hackathon 2023

2023-03-21 Thread Jerry Lundström

Hi all,

Quick reminder, only a few days left to register for the hackathon!

Cheers,
Jerry

On 2/28/23 16:13, Jerry Lundström wrote:

Hi all,

DNS-OARC, Netnod and RIPE NCC invite you to join us for our DNS 
Hackathon in Rotterdam, 20 - 21 May 2023 the weekend before RIPE 86!


   <https://www.netnod.se/join-the-dns-hackathon-2023>

Apply Now!

   <https://www.ripe.net/participate/forms/apply/dns-hackathon-2023/>

Special thanks to our sponsors SIDN, NLnet Labs and ISC!

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNS Hackathon 2023

2023-03-01 Thread Jerry Lundström

Hi Andrew,

On 3/1/23 10:27, Andrew McConachie wrote:


Is this a competitive hackathon or the kind of thing where like minded 
people get together and work on DNS related code and have fun?


This is purely non-competitive; we prefer cooperation and teamwork (see 
Hackathon Format).


The linked webpage talks about the organizers selecting the “best mix 
and match of skills, backgrounds and experieces.[sic]” Is this intended 
to make participants feel as though they are applying for a position at 
the Hackathon? This concept is new to me.


This format has been done by RIPE NCC many times before and it's a 
selection process because of limited amount of seats and to be as 
inclusive/diverse as possible, for example "not more than two people 
from the same organisation".


Hackathons come in many shapes and sizes, but the only ones I’ve been to 
were largely unstructured and emphasized collaboration over competition 
and seclectivity. Maybe put some more words on the linked page below 
describing what participants can expect.


Have you looked at the Netnod link?

There like 1700 words describing everything about the hackathon, what do 
expect before, during and after the event :)


Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] DNS Hackathon 2023

2023-02-28 Thread Jerry Lundström

Hi all,

DNS-OARC, Netnod and RIPE NCC invite you to join us for our DNS 
Hackathon in Rotterdam, 20 - 21 May 2023 the weekend before RIPE 86!


  

Apply Now!

  

Special thanks to our sponsors SIDN, NLnet Labs and ISC!

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNS-over-TLS/DNS-over-QUIC interoperability testing?

2022-06-27 Thread Jerry Lundström

Hi all,

On 6/9/22 15:10, Jerry Lundström wrote:


I'm looking for resolvers that can talk DoT/DoQ with authorities using 
probing or other ways that is not fixed/forwarding configuration.


If anyone want to test DoT/DoQ from resolvers -> authority then you 
could use cmdns-cli and the new checks I just added (see latest 
development update for more info [1]).  Use `-res` to specify the 
resolver to use.


$ go install github.com/DNS-OARC/cmdns-cli@v1.0.0
$ cmdns-cli -checks trans_dot,trans_doq -done | \
  grep -e prepare -e complete
connecting to wss://cmdns.dev.dns-oarc.net:443/ws/
{"send":{"prepare":{"done":false,"total":0,"checks":["trans_dot","trans_doq"]}}}
{"prepare":{"done":false,"total":4}}
{"prepare":{"done":true,"total":0,"id":"27seipp4qt35b57v94r8lg0p60","name":"DoT","desc":"Check 
if resolver uses DNS-over-TLS","cat":"transport","score":50}}
{"prepare":{"done":true,"total":0,"id":"f8gkld0kt16ndcprg0mikthavs","name":"DoQ","desc":"Check 
if resolver uses DNS-over-QUIC","cat":"transport","score":50}}

{"prepare":{"done":true,"total":0}}
{"prepare":{"done":true,"total":0}}
{"complete":{"id":"f8gkld0kt16ndcprg0mikthavs","succ":false,"msg":"Queries 
total:20 over-DoQ:0"}}
{"complete":{"id":"27seipp4qt35b57v94r8lg0p60","succ":false,"msg":"Queries 
total:20 over-DoT:0"}}



PS, as you can see I did this without something that talked DoT/DoQ :)

Cheers,
Jerry

[1] <https://dnsoarc.medium.com/development-update-2206-868628a987a5>
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] DNS-over-TLS/DNS-over-QUIC interoperability testing?

2022-06-09 Thread Jerry Lundström

Hi,

I'm looking for resolvers that can talk DoT/DoQ with authorities using 
probing or other ways that is not fixed/forwarding configuration.


Anyone know of any public available ones?

Or if you are in the mist of developing these features and want to do 
some interoperability testing then feel free to reply directly to me.


PS, I already know of PowerDNS recursor, unbound and knot.

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNSViz please support DNSSEC algorithm Ed25519 (15)

2021-01-04 Thread Jerry Lundström
Hi Arsen,

On 2021-01-04 09:30, Arsen STASIC wrote:
> Hi Jerry,
> 
> * Jerry Lundström  [2021-01-04 09:19 (+0100)]:
>> On 2020-12-30 12:42, Arsen STASIC wrote:
>>> Could you please support DNSSEC algorithm Ed25519 (15)?
>>> I think Casey Deccio has already added support for Ed25519. [0]
>     ^

Ah, I miss read.

> I think the code is ready (see [0]).
> Now it's on DNS-OARC to git pull and run it ;-)

I believe Casey has access to push new code himself to the site but if
it's new code then maybe there is a reason it's not up yet, besides that
it's still holiday season.

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] DNSViz please support DNSSEC algorithm Ed25519 (15)

2021-01-04 Thread Jerry Lundström
Hi Arsen,

On 2020-12-30 12:42, Arsen STASIC wrote:
> Could you please support DNSSEC algorithm Ed25519 (15)?
> I think Casey Deccio has already added support for Ed25519. [0]

While we (DNS-OARC) host and operate the public instance of DNSViz, the
code is still owned and managed by Casey Deccio so I'd suggest you
create an issue on DNSViz's GitHub:

  

Also, as DNSViz is a open source project, you are more then welcome to
help develop this support. We can also help with managing the funds for
such a development, please see Funding Development at
.

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


Re: [dns-operations] Flag Day’s Resolver Tester: reports all my netblocks wrong

2020-09-14 Thread Jerry Lundström
Hi Pirawat,

On 2020-09-11 16:23, Pirawat WATANAPONGSE wrote:
> The new Resolver Tester for this year Flag Day reports all my netblocks
> wrong [Reference:
> https://drive.google.com/file/d/1gIf-BFXpBBu7Y03VbJbtpc5p2REOkoLC/view?usp=sharing
> ]

The screenshot is from Check My DNS, which is not related to DNS Flag Day.

The DNS Flag Day 2020 page uses a special domain on Check My DNS that
truncates all UDP requests so that the DNS Flag Day 2020 tester can
check if the request is retransmitted over TCP.

> My 158.108.0.0/16 was already (historically) transferred to APNIC
> [Reference: https://bgp.he.net/net/158.108.0.0/16#_whois]
> and my 2406:3100::/32 is registered directly with APNIC right from the
> start [Reference: https://bgp.he.net/net/2406:3100::/32#_whois]

Check My DNS uses standard WHOIS querying based on prefixes from IANA
and caches the information for a day or so.

158/8 still points at ARIN and the query for 158.108.213.5 will return a
referral to APNIC.

But Check My DNS does not support referrals (yet).

> Obviously, I have to assume that I did make mistake(s). But where and why?
> Please tell me how to fix it.

There are no mistakes, once I have time to add referral support to Check
My DNS it will show the correct information.

Cheers,
Jerry
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


[dns-operations] RPKI origin validation for resolvers!

2019-11-11 Thread Jerry Lundström
Hi all,

Check My DNS [1] can now check if RPKI origin validation is enabled for
the resolvers that queries it.

Download cmdns-cli [2] and run `cmdns-cli -checks trans_rpkiv4`, read
this blog post [3] for more details.

Special thanks to Job Snijders (NTT) for making this possible!

Cheers,
Jerry

[1] 
[2] 
[3]

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations