schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

12
active users

#dnssec

0 posts0 participants0 posts today
Anton<p>Hat hier wer Connections zur IT-Abteilung von aok.de? Die haben gestern das SSL-Zertifikat ihres mx1.aok.de getauscht, aber den TLSA-Record für DANE übersehen...</p><p><a href="https://dane.sys4.de/smtp/service.bw.aok.de" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dane.sys4.de/smtp/service.bw.a</span><span class="invisible">ok.de</span></a></p><p>20:00 Uhr: geht wieder! Danke :)</p><p><a href="https://mastodon.social/tags/DANE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DANE</span></a> <a href="https://mastodon.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://mastodon.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://mastodon.social/tags/aok" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aok</span></a></p>
nan0<p>Does anyone has a contact to the Joint Research Centre (<a href="https://chaos.social/tags/JRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JRC</span></a>) [0] or My Email Communications Security Assessment (<a href="https://chaos.social/tags/MECSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MECSA</span></a>) [1] (both from the <a href="https://chaos.social/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a>)?</p><p>I find the tool great... if it would parse <a href="https://chaos.social/tags/SPF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPF</span></a>/#IPv6 correctly und actually check for <a href="https://chaos.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>...</p><p>I've tried emailing them, but no response :/</p><p>Links:<br>[0]: <a href="https://joint-research-centre.ec.europa.eu/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">joint-research-centre.ec.europ</span><span class="invisible">a.eu/</span></a><br>[1]: <a href="https://mecsa.jrc.ec.europa.eu/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mecsa.jrc.ec.europa.eu/</span><span class="invisible"></span></a></p>
F. Maury ⏚<p>Bon, bah les ami.es, dans un mois, je suis disponible en tant que freelance pour... plein de trucs, en fait 😅 </p><p>J'ai un passé de développeur en <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> et <a href="https://infosec.exchange/tags/Go" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Go</span></a> (7 ans+). J'ai un passé de <a href="https://infosec.exchange/tags/DevOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevOps</span></a> (3 ans). J'ai un passé d'architecture système et réseau (12 ans). J'ai même un passé d'auditeur en sécurité (2 ans) et de chercheur en sécurité réseau avec de la crypto dedans (5 ans). J'ai aussi assuré un certain nombre de formations, notamment en sécurité informatique (<a href="https://infosec.exchange/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>, identité et authentification, administration sécurisée, sécurité web, git, IPFS...)</p><p>Je tiens un blog (<a href="https://broken-by-design.fr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">broken-by-design.fr</span><span class="invisible"></span></a>) et un podcast (<a href="https://pod.broken-by-design.fr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pod.broken-by-design.fr</span><span class="invisible"></span></a>).</p><p>Je bouffe du Terraform au petit dej ; j'adore taffer sur des technologies immuables (notamment Fedora CoreOS mais Flatcar m'a fait beaucoup de pied, récemment) ; systemd, c'est la vie.</p><p>Voilà, si vous m'avez pas bloqué avec cette dernière affirmation, et que vous avez besoin d'un coup de main sur vos projets, venez on discute !</p><p>Le boost est doux 💗 </p><p><a href="https://infosec.exchange/tags/getfedihired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedihired</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurite</span></a></p>
Stéphane Bortzmeyer<p>"I don't understand why <a href="https://mastodon.gougere.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> is not yet the default for resolvers on Linux machines."</p><p><a href="https://mastodon.gougere.fr/tags/FOSDEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSDEM</span></a></p>
thomascovenant<p>I found out that Traficom, who operate the .fi TLD intends to switch off DNSSEC for two weeks in April 2025 (by asking IANA to remove the DS record for .fi) while they are doing an algorithm roll. Somehow they can't do the algorithm roll while staying DNSSEC signed.</p><p>Plenty of other TLDs have performed algorithm rollovers while staying DNSSEC signed. This plan is quite careless.</p><p>Does anyone know any high profile .fi domain that is DNSSEC signed and uses DANE, CAA, the dns01 challenge for ACME (letsencrypt), or SSHFP?</p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a></p>
NLnet Labs<p>We're in the final stint of our one-year commitment to <span class="h-card" translate="no"><a href="https://mastodon.social/@sovtechfund" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sovtechfund</span></a></span> to build a memory-safe library for <a href="https://fosstodon.org/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a>. </p><p>By the end of 2024, our `domain` crate for <a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a> will feature a caching stub resolver, zone transfers, <a href="https://fosstodon.org/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> validation and signing, request routing and a proxy, along with tooling for DNS inspection (dnsi) and manipulation (dnst). </p><p>In 2025, we'll continue building at the same pace with the same team and we're eager to hear what you would like to see us build most. Let us know!</p>
c't Magazin<p>heise+ | DNS-Sicherheit: Automatischer Schutz für Jedermann-Domains</p><p>Die Sicherheitstechnik DNSSEC leistet einen wichtigen Beitrag zum Schutz des Internetverkehrs. Ein Berliner Team ergänzt nun die DNS-Spezifikation. </p><p><a href="https://www.heise.de/hintergrund/DNS-Sicherheit-Automatischer-Schutz-fuer-Jedermann-Domains-9803841.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/DNS-Siche</span><span class="invisible">rheit-Automatischer-Schutz-fuer-Jedermann-Domains-9803841.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://social.heise.de/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://social.heise.de/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Server</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
JP Mens<p>Iterations count in NSEC3PARAM record MUST be 0 (zero), says RFC 9276</p><p>FUCK YOU, say 167 TLDs</p><p><a href="https://gist.github.com/jpmens/4032d66bed11cd46674627da942e465d" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/jpmens/4032d66</span><span class="invisible">bed11cd46674627da942e465d</span></a></p><p><a href="https://mastodon.social/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a></p>
Colin Cogle :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@jerry" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jerry</span></a></span> I use Hurricane Electric’s free DNS service. I run a hidden primary that syncs with them, and they provide five named secondaries. Full support for <a href="https://mastodon.colincogle.name/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a>, because it’s not 1998 anymore. <a href="https://dns.he.net" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dns.he.net</span><span class="invisible"></span></a></p>
IT News<p>DNS glitch that threatened Internet stability fixed; cause remains unclear - Enlarge </p><p>For more than four days, a server at the very core of... - <a href="https://arstechnica.com/?p=2026566" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2026566</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/domainnamesystem" class="mention hashtag" rel="tag">#<span>domainnamesystem</span></a> <a href="https://schleuss.online/tags/rootservers" class="mention hashtag" rel="tag">#<span>rootservers</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/dnssec" class="mention hashtag" rel="tag">#<span>dnssec</span></a> <a href="https://schleuss.online/tags/dns" class="mention hashtag" rel="tag">#<span>dns</span></a></p>
bert hubert 🇺🇦🇪🇺🇺🇦<p>This is quite rare - the C root-servers are out of sync with the rest of the world by 3 days. Since that time there have been no changes in the root zone, except for DNSSEC signature updates. It appears all C instances (operated by <a href="https://fosstodon.org/tags/cogent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cogent</span></a>) are serving an outdated zone. For now this has no operational impact, but that might change <a href="https://fosstodon.org/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> - UPDATE, c-root received an update and now only lags behind by 1 day now. UPDATE2: fixed.</p>
IPFire News<p>IPFire protects your DNS requests from being forged by using <a href="https://social.ipfire.org/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a></p>
cynicalsecurity :cm_2:<p>… so I went off and I read the relevant document at the ISC website¹ to migrate to the new dnssec-policy and am now thoroughly confused.</p><p>Not only, according to DNSVIZ I am a bad bad sysadmin signing with algorithm 7 (RSASHA1NSEC3SHA1 for those in the know) and I dread having to go through the whole <a href="https://bsd.network/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> setup again.</p><p>:flan_despair:​</p><p>Is there a guide for the lazy sysadmin who set up DNSSEC following "In-line Signing with NSEC3 in BIND 9.9+ - A Walk-through"² dated 2019 and now have no clue?</p><p>:flan_piteous:​<br>__<br>¹ <a href="https://kb.isc.org/docs/dnssec-key-and-signing-policy" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kb.isc.org/docs/dnssec-key-and</span><span class="invisible">-signing-policy</span></a><br>² <a href="https://kb.isc.org/docs/aa-00711" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">kb.isc.org/docs/aa-00711</span><span class="invisible"></span></a></p>
Internet.nl<p><span class="h-card" translate="no"><a href="https://io.mwl.io/@mwl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mwl</span></a></span> <br>DANE is more and more used for *authenticated* transport encryption of email. Check:<br>* Test: <a href="https://dane.sys4.de" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dane.sys4.de</span><span class="invisible"></span></a>, <a href="https://stats.dnssec-tools.org/explore/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stats.dnssec-tools.org/explore</span><span class="invisible">/</span></a>, <a href="https://en.internet.nl/test-mail/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">en.internet.nl/test-mail/</span><span class="invisible"></span></a><br>* Wiki: <a href="https://github.com/baknu/DANE-for-SMTP/wiki" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/baknu/DANE-for-SMTP</span><span class="invisible">/wiki</span></a><br>* Howto: <a href="https://github.com/internetstandards/toolbox-wiki/blob/master/DANE-for-SMTP-how-to.md" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/internetstandards/t</span><span class="invisible">oolbox-wiki/blob/master/DANE-for-SMTP-how-to.md</span></a><br>* Blog: <a href="https://blog.apnic.net/2019/11/20/better-mail-security-with-dane-for-smtp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.apnic.net/2019/11/20/bett</span><span class="invisible">er-mail-security-with-dane-for-smtp/</span></a></p><p>Furthermore, note that MS already supports outbound DANE on Exchange Online and plans to support inbound DANE mid 2024: <br>- <a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/releasing-outbound-smtp-dane-with-dnssec/ba-p/3100920" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/exchange-team-blog/releasing-outbound-smtp-dane-with-dnssec/ba-p/3100920</span></a><br>- <a href="https://techcommunity.microsoft.com/t5/exchange-team-blog/implementing-inbound-smtp-dane-with-dnssec-for-exchange-online/ba-p/3939694" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/exchange-team-blog/implementing-inbound-smtp-dane-with-dnssec-for-exchange-online/ba-p/3939694</span></a></p><p><a href="https://mastodon.nl/tags/DANE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DANE</span></a> <a href="https://mastodon.nl/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://mastodon.nl/tags/mailsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mailsecurity</span></a></p>
Antonio Prado"Since the initial disclosure of the vulnerabilities on November 2, 2023, we have been working with all major vendors on mitigating the problems in their implementations."<br><br>"We recommend that everyone installs the patches and updates their DNS software. We recommend to continue using DNSSEC, encourage the domains to get signed, and all the resolvers to enforce DNSSEC validation. DNSSEC is the only practical measure to block DNS cache poisoning attacks."<br><br><a href="https://labs.ripe.net/author/haya-shulman/keytrap-algorithmic-complexity-attacks-exploit-fundamental-design-flaw-in-dnssec/" rel="nofollow noopener noreferrer" target="_blank">https://labs.ripe.net/author/haya-shulman/keytrap-algorithmic-complexity-attacks-exploit-fundamental-design-flaw-in-dnssec/</a><br><br><a class="hashtag" href="https://social.prado.it/tag/dnssec" rel="nofollow noopener noreferrer" target="_blank">#DNSSEC</a> <a class="hashtag" href="https://social.prado.it/tag/dns" rel="nofollow noopener noreferrer" target="_blank">#DNS</a> <a class="hashtag" href="https://social.prado.it/tag/keytrap" rel="nofollow noopener noreferrer" target="_blank">#KEYTRAP</a>
Jan Schaumann<p>Reminder that today is the weird gathering of the guardians of the <a href="https://mstdn.social/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> to break out the "Key to the Internet" (aka the Root Key Signing Key or KSK) to (in this case) sign the 2024Q2 Zone Signing Keys (ZSKs), and if that's your sort of nerdy jam, you can watch the ceremony live starting in a little over an hour:</p><p><a href="https://www.iana.org/dnssec/ceremonies/52" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">iana.org/dnssec/ceremonies/52</span><span class="invisible"></span></a></p><p><a href="https://mstdn.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a></p>
Ondřej Surý<p>Also hug your <a href="https://mastodon.rfc1925.org/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> recursive resolver <a href="https://mastodon.rfc1925.org/tags/Developers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Developers</span></a>, they needed it for past couple of weeks and they couldn’t tell anyone.</p><p><a href="https://mastodon.rfc1925.org/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://mastodon.rfc1925.org/tags/KeyTrap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyTrap</span></a> <a href="https://mstdn.social/@rysiek/111926495878067817" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mstdn.social/@rysiek/111926495</span><span class="invisible">878067817</span></a></p>
heise Security<p>DNS-Server: Bind und Unbound stolpern über Sicherheitslücke "KeyTrap" </p><p>Mit einer präparierten DNS-Anfrage können Angreifer eine hohe Prozessorlast verursachen und den Dienst für legitime Nutzer so blockieren. Patches stehen bereit.</p><p><a href="https://www.heise.de/news/DNS-Server-Bind-und-Unbound-stolpern-ueber-Sicherheitsluecke-KeyTrap-9627276.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/DNS-Server-Bind-</span><span class="invisible">und-Unbound-stolpern-ueber-Sicherheitsluecke-KeyTrap-9627276.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege</span></a></p><p><a href="https://social.heise.de/tags/DoSSchwachstelle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoSSchwachstelle</span></a> <a href="https://social.heise.de/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
NLnet Labs<p>🚨 We have released version 1.19.1 of Unbound <a href="https://fosstodon.org/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> resolver, which contains <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> fixes for CVE-2023-50387 and CVE-2023-50868. ⚠️ Please update as soon as possible in order to mitigate two <a href="https://fosstodon.org/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> validation vulnerabilities that affect all well-known resolvers. <a href="https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlnetlabs.nl/news/2024/Feb/13/</span><span class="invisible">unbound-1.19.1-released/</span></a></p>
heise online<p>Analyse: Ausfall von .ru war wohl kein Kriegsopfer oder Zensurfall </p><p>Die Ausfälle zahlreicher Dienste mit der TLD .ru waren wohl ein technischer Fehler oder menschliches Versagen. Eine Post-mortem-Analyse dazu legt das nahe.</p><p><a href="https://www.heise.de/news/Analyse-Ausfall-von-ru-war-wohl-kein-Kriegsopfer-oder-Zensurfall-9617520.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Analyse-Ausfall-</span><span class="invisible">von-ru-war-wohl-kein-Kriegsopfer-oder-Zensurfall-9617520.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege</span></a></p><p><a href="https://social.heise.de/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://social.heise.de/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>