Re: [DNG] I kinda sorta got opennic DNS working

2021-03-09 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> Hi,
> can this opennic.cache file be downloaded freely or do you need
> to register?

As mentioned, I have not experimented with alternative DNS roots in decades.

I could try to answer your question for you, but, seriously, if you are
going to start experimenting with advanced DNS topics, you really need
to be prepared to do basic data-discovery for yourself at _bare_
minimum.  If you are not, I would advise staying away from such matters.

I am _not_ prepared to spoon-feed novices on such topics.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting tito via Dng (dng@lists.dyne.org):

> Hi,
> just for fast information, is it enough for unbound to remove:
> 
> forward-zone:
> #forward-first: yes
> name: "."
> forward-tls-upstream: yes
> forward-addr: 1.1.1.1@853#cloudflare-dns.com
> forward-addr: 1.0.0.1@853#cloudflare-dns.com
> forward-addr: 8.8.4.4@853#dns.google
> forward-addr: 8.8.8.8@853#dns.google
> forward-addr: 9.9.9.9@853#dns.quad9.net
> forward-addr: 185.222.222.222@853#dns.sb
> forward-addr: 185.184.222.222@853#dns.sb

Answer below.

> Makes it sense to keep:
> 
> server:
> tls-upstream: yes
> tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt

On that: yes.

On the former question, er, I'm actually a bit non-plussed about why
those forwarder lines are in your configuration file in the first place.

Forgive me, but it's rather late at night in my time zone, and I am not
at peak alertness, _but_ my guess is that Unbound got set up somehow 
configured to forward outbound recursive queries to those entities,
leaving me perplexed about why anyone would do that.

That having been said, I personally would definitely _not_ want to have
that configuration detail in my recursive nameserver state, without an
extremely compelling reason, because doing that appears to largely
defeat the entire purpose of running one's own recursive nameserver.
Analogously, it would be like setting up a fully capable SMTP smarthost 
on a stable public IP address with free routing to 25/tcp anywhere in
the world, but then configuring it to forward all outbound SMTP traffic
to an untrustworthy ISP external mail host.  Which would lead one to
wonder, why?

I hope that helps.  I have no idea what else you might have in your
configuration that ought not to be there, obviously.


> I ask because after reading the thread I've tried on one
> of my home's net dns servers and it worked (I could browse the web)
> but browsing speed was noticeably slower, does it improve
> in the long run or do we have to choose between 
> privacy and speed?

I'm seriously not sure why operating a local recursive nameserver would
be expected to reduce speed.  Obviously, at initial startup of that
process, it has nothing yet in cache and needs to do some queries of
often-used FQDNS, but I would expect that it would very quickly improve
DNS performance over _any_ nameserver on the far side of your uplink, 
because obviously your speed of local DNS resolution is really fast
relative to your uplink, right?


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-09 Thread tito via Dng
On Tue, 9 Mar 2021 22:02:47 -0800
Rick Moen  wrote:

> Quoting Steve Litt (sl...@troubleshooters.com):
> 
> > When I added four opennic root servers to my unbound's root.hints
> 
> {laughs}
> 
> Oh, you sweet summer child.  Experimenting with alternative DNS roots,
> eh?
> 
> It's been decades since I've done so, but ISTR that the correct way to
> do that is to re-point the root-hints line in your Unbound conf file
> to opennic.cache.
> 
> > I'd really like to have both icann and opennic root servers in my
> > root.hints.
> 
> No, you don't.
> 
> opennic.cache should include the standard TLD nameservers.
> 
Hi,
can this opennic.cache file be downloaded freely or do you need
to register?

Ciao,
Tito
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread tito via Dng
On Tue, 9 Mar 2021 22:26:29 -0800
Rick Moen  wrote:

> Quoting Gabe Stanton via Dng (dng@lists.dyne.org):
> 
> > In the absence of a "community of dns server operators and users",
> > is the optimal option to have everyone run their own recursive
> > server? But then the upstream servers still get the birds-eye view
> > and will very likely abuse that information like the big companies
> > do now. 
> 
> Please pardon my being blunt, but I don't think you have a realistic
> understanding of how typical patterns of authoritative nameservice
> data and caching work.  I rather suspect you haven't stopped to think
> about that.
> 
> Let's say I run a local recursive DNS nameserver on my local LAN for
> use by my and all other local hosts.  For the sake of discussion, let
> us assume that it has what is misleadingly called an 'ICANN' root
> hints file.
> 
> At service startup time, the instance starts getting and caching TLD,
> SLD, etc. authoritative data and caching it for the duration of
> TTLs. Right, now, kindly tell me where on the planet is the network
> node that provides a "birds-eye view" of query traffic processed by
> my recursive server?  The root nameservers?  Nope, not hardly.  All
> they have is the hits where my nameserver followed the RD-bit-marked
> queries to find various TLD nameservers.  TLD zones' nameservers?
> Nope, not hardly. They have only analogous logfile data when my
> nameserver first located and then cached information about SLD
> nameservers.
> 
> In fact, the very fact that I am operating a recursive nameserver
> means that I have greatly impoverished every possible spying vantage
> point. The best of the bad choices in places to spy on my network's
> port-53 activity is thus right on the far side of my network uplink,
> at my local bandwidth provider.  And, even there, because of
> pervasive caching, even my uplink has extremely poor data about what
> the machines on my local LAN are looking up.
> 
> Ideally, one has a contractual relationship with a reputable good
> provider who looks after customer interests in accordance to local
> business practices and law, such as (to cite the USA local legal
> concept) the implied covenant of good faith and fair dealing.
> However, that contract concept is (naturally) not a shield for
> privacy but rather a cudgel to wield in civil litigation, so the best
> thing to do is to limit what your immediate uplink can learn about
> your network traffic. Various crypto schemes help limit that data,
> but -- my point -- so does operating a local recursive nameserver,
> rather than outsourcing to -anyone- on the other side of the uplink.
Hi,
just for fast information, is it enough for unbound to remove:

forward-zone:
#forward-first: yes
name: "."
forward-tls-upstream: yes
forward-addr: 1.1.1.1@853#cloudflare-dns.com
forward-addr: 1.0.0.1@853#cloudflare-dns.com
forward-addr: 8.8.4.4@853#dns.google
forward-addr: 8.8.8.8@853#dns.google
forward-addr: 9.9.9.9@853#dns.quad9.net
forward-addr: 185.222.222.222@853#dns.sb
forward-addr: 185.184.222.222@853#dns.sb

Makes it sense to keep:

server:
tls-upstream: yes
tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt

I ask because after reading the thread I've tried on one
of my home's net dns servers and it worked (I could browse the web)
but browsing speed was noticeably slower, does it improve
in the long run or do we have to choose between 
privacy and speed?

Thanks in advance.

Ciao,
Tito
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting Gabe Stanton via Dng (dng@lists.dyne.org):

> In the absence of a "community of dns server operators and users", is
> the optimal option to have everyone run their own recursive server? But
> then the upstream servers still get the birds-eye view and will very
> likely abuse that information like the big companies do now. 

Please pardon my being blunt, but I don't think you have a realistic
understanding of how typical patterns of authoritative nameservice data
and caching work.  I rather suspect you haven't stopped to think about
that.

Let's say I run a local recursive DNS nameserver on my local LAN for use
by my and all other local hosts.  For the sake of discussion, let us
assume that it has what is misleadingly called an 'ICANN' root hints
file.

At service startup time, the instance starts getting and caching TLD,
SLD, etc. authoritative data and caching it for the duration of TTLs.  
Right, now, kindly tell me where on the planet is the network node that
provides a "birds-eye view" of query traffic processed by my recursive
server?  The root nameservers?  Nope, not hardly.  All they have is the
hits where my nameserver followed the RD-bit-marked queries to find
various TLD nameservers.  TLD zones' nameservers?  Nope, not hardly.  
They have only analogous logfile data when my nameserver first located
and then cached information about SLD nameservers.

In fact, the very fact that I am operating a recursive nameserver means
that I have greatly impoverished every possible spying vantage point.
The best of the bad choices in places to spy on my network's port-53 
activity is thus right on the far side of my network uplink, at my local
bandwidth provider.  And, even there, because of pervasive caching, even 
my uplink has extremely poor data about what the machines on my local
LAN are looking up.

Ideally, one has a contractual relationship with a reputable good
provider who looks after customer interests in accordance to local
business practices and law, such as (to cite the USA local legal
concept) the implied covenant of good faith and fair dealing.  However, 
that contract concept is (naturally) not a shield for privacy but rather
a cudgel to wield in civil litigation, so the best thing to do is to
limit what your immediate uplink can learn about your network traffic.
Various crypto schemes help limit that data, but -- my point -- so does 
operating a local recursive nameserver, rather than outsourcing to
-anyone- on the other side of the uplink.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Steve Litt
Wirelessduck wrote:

>What’s the consensus on Quad9?

Didn't The Temptations do that in 1969?

SteveT

Steve Litt 
Spring 2021 featured book: Troubleshooting Techniques of the Successful
Technologist http://www.troubleshooters.com/techniques
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting wirelessduck--- via Dng (dng@lists.dyne.org):

> What’s the consensus on Quad9? Are they any better from a privacy
> standpoint?

To say again, why outsource recursive nameservice to _anyone_?

You seem like a large number of people who are weirdly resistant to 
the notion of basic control of one's own fundamental network
infrastructure and looking for some stranger to outsource the task to,
and I keep wondering why the obvious alternative of running a recursive
DNS nameserver instance locally isn't even considered, let alone the
obvious default choice.

But hey, whatever works for you.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Rick Moen
Quoting Dimitris via Dng (dng@lists.dyne.org):

> so, i would be interested to know, if there's a privacy issue with
> opennnic?

I have no problem with people who decide to adopt alternate roots.

What I was talking about upthread was outsourcing one's recursive
nameservice to OpenNIC's public recursive nameserver IPs, or any other
stranger's.  Because, well, why?  Recursive service is dead-easy to do
with one's local computing resources, protecting one's autonomy,
security, performance, and privacy just that tiny bit more.


___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] I kinda sorta got opennic DNS working

2021-03-09 Thread Rick Moen
Quoting Steve Litt (sl...@troubleshooters.com):

> When I added four opennic root servers to my unbound's root.hints

{laughs}

Oh, you sweet summer child.  Experimenting with alternative DNS roots,
eh?

It's been decades since I've done so, but ISTR that the correct way to
do that is to re-point the root-hints line in your Unbound conf file
to opennic.cache.

> I'd really like to have both icann and opennic root servers in my
> root.hints.

No, you don't.

opennic.cache should include the standard TLD nameservers.

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi-meet server in DMZ

2021-03-09 Thread Florian Zieboll via Dng
On Tue, 09 Mar 2021 23:02:11 +
g4sra via Dng  wrote:

> ‐‐‐ Original Message ‐‐‐
> On Tuesday, March 9, 2021 4:00 PM, Florian Zieboll via Dng
>  wrote:
> 
> > On Tue, 09 Mar 2021 14:18:34 +
> > g4sra via Dng dng@lists.dyne.org wrote:
> > 
> 
> > > The meeting being hosted on the server needs to be simultaneously
> > > accessible as two different domains, internal.com and
> > > external.com. Anyone achieved this yet or know a better way ?
> > 
> 
> > Not sure if "better", but works for me: I connect to the DMZ'ed
> > server from the LAN using its external FQDN.
> > 
> 
> > libre Grüße,
> > Florian
> 
> Thanks for the reply Florian.
> 
> Decided to use the external FQDN and implement BIND's
> response-policy' lying to the internal domain. If anyone can think of
> a good reason why this is a bad idea please shout.


My external router does NAT, only required ports (443, 5349, 1) are
forwarded. No DNS magic necessary here, I just commented the
'org.ice4j.ice.harvest.STUN_MAPPING_HARVESTER_ADDRESSES' line in the
videobridge's 'sip-communicator.properties' and instead added the
following two:

org.ice4j.ice.harvest.NAT_HARVESTER_LOCAL_ADDRESS=
org.ice4j.ice.harvest.NAT_HARVESTER_PUBLIC_ADDRESS=

___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi-meet server in DMZ

2021-03-09 Thread g4sra via Dng
‐‐‐ Original Message ‐‐‐
On Tuesday, March 9, 2021 4:00 PM, Florian Zieboll via Dng  
wrote:

> On Tue, 09 Mar 2021 14:18:34 +
> g4sra via Dng dng@lists.dyne.org wrote:
> 

> > The meeting being hosted on the server needs to be simultaneously
> > accessible as two different domains, internal.com and external.com.
> > Anyone achieved this yet or know a better way ?
> 

> Not sure if "better", but works for me: I connect to the DMZ'ed server
> from the LAN using its external FQDN.
> 

> libre Grüße,
> Florian

Thanks for the reply Florian.

Decided to use the external FQDN and implement BIND's response-policy' lying to 
the internal domain.
If anyone can think of a good reason why this is a bad idea please shout.


publickey - g4sra@protonmail.com - 0x42E94623.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Strange behaviour with last version of grub

2021-03-09 Thread Adrian Zaugg
In der Nachricht vom Saturday, 6 March 2021 19:16:13 CET schrieb fsmithred via 
Dng:
> I could not reproduce the problem on a system that boots legacy bios and
> uses grub-pc.

...my machine where it happened is a Legacy-BIOS-MBR-Installation.


signature.asc
Description: This is a digitally signed message part.
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)

2021-03-09 Thread Larry De Coste via Dng
On Sun, 7 Mar 2021 09:50:53 -0500
Steve Litt wrote among other things:

|Likewise, when I used Ubuntu, I wanted to get rid of Plymouth, which
|in my opinion is eye-candy for Windows Weenies. I tried and failed
|with package-manager-fu. I tried and failed with several other
|approaches. Finally I just renamed the Plymouth executable, and
|BANG, things worked like I wanted them to.

I can't believe that someone who knows what they're doing did this
too.

In my case it was Sparky JWM (Debian Testing NOT Ubuntu based), a
fine, but systemd, distro BTW: I just couldn't fix the
errors I kept getting on apt-get dist-upgrade, until I killed
Plymouth.

-- 

"While some hold that perfection is the enemy of the good,
 I've found that it is only in its pursuit that one avoids the
mediocre."

Larry De Coste 
Pawtucket RI EE.UU.
Cell/Signal/Txt: +1(401) 275-3712
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Strange behaviour with last version of grub

2021-03-09 Thread David Kuehling via Dng
> On 3/4/21 11:08 PM, wirelessduck--- via Dng wrote:
>>> 
>>> And now the question. Has anyone reported the error in Devuan? Has
>>> anyone haved this problem?
>> 
>> Seems to be a bit of news about the latest update.
>> https://9to5linux.com/patches-for-multiple-new-grub2-security-flaws-start-rolling-out-to-linux-distros-update-now
>> 
>> The changelog mentions changes to secure boot. Could that be related
>> to the issue?

Same problem here.

I think we were bitten by this known Debian Bug:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925309

"Wrong prefix directory hardcoded in signed GRUB image"

Signed grub assumes that the initial grub.cfg is in EFI/debian/grub.cfg
and not in wherever grub-install put it (usually EFI/devuan/grub.cfg or
EFI/BOOT/grub.cfg).

You can verify this by entering "set" on the grub command line and
checking the default value of the "prefix" and "root" variables.

Workaround for me is to manually enter

  configfile (hd2,gpt1)/EFI/devuan/grub.cfg

every time I boot my machine.

cheers,

David
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi-meet server in DMZ

2021-03-09 Thread Florian Zieboll via Dng
On Tue, 09 Mar 2021 14:18:34 +
g4sra via Dng  wrote:

> The meeting being hosted on the server needs to be simultaneously
> accessible as two different domains, internal.com and external.com.
> 
> Anyone achieved this yet or know a better way ?


Not sure if "better", but works for me: I connect to the DMZ'ed server
from the LAN using its external FQDN. 

libre Grüße,
Florian
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


[DNG] Jitsi-meet server in DMZ

2021-03-09 Thread g4sra via Dng
The meeting being hosted on the server needs to be simultaneously accessible as 
two different domains, internal.com and external.com.

Anyone achieved this yet or know a better way ?

publickey - g4sra@protonmail.com - 0x42E94623.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi advice please [SOLVED] ish

2021-03-09 Thread g4sra via Dng
‐‐‐ Original Message ‐‐‐
On Tuesday, March 9, 2021 1:00 PM, al3xu5  wrote:

> Mon, 08 Mar 2021 22:01:53 + - g4sra g4...@protonmail.com:
> 

> > It turns out 80 of the issue was a syntax error in the ALSA
> > configuration. For an unknown reason this mostly only caused an issue
> > for web browsers. In fact I only detected it when running some third
> > party alsa software that displayed a warning.
> 

> Hi
> 

> Being interested about audio (ALSA), may I ask you which were the third
> party alsa software that displayed a warning?
> 

> Thanks
> al3xu5

I copied the 'c' code from here...

https://stackoverflow.com/questions/40346132/how-to-properly-set-up-alsa-device#40363505

None of the alsa-utils gave any hint that there was a configuration issue, 
whereas the above program barfed.

publickey - g4sra@protonmail.com - 0x42E94623.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng


Re: [DNG] Jitsi advice please [SOLVED] ish

2021-03-09 Thread al3xu5
Mon, 08 Mar 2021 22:01:53 + - g4sra :

> It turns out 80 of the issue was a syntax error in the ALSA
> configuration. For an unknown reason this mostly only caused an issue
> for web browsers. In fact I only detected it when running some third
> party alsa software that displayed a warning.

Hi

Being interested about audio (ALSA), may I ask you which were the third
party alsa software that displayed a warning?

Thanks
al3xu5

-- 
Say NO to copyright, patents, trademarks and industrial design
restrictions!


Public GPG/PGP key: 8FC2 3121 2803 86E9 F7D8  B624 DA50 835B 2624 A36B


pgpaBxepbyTUj.pgp
Description: Firma digitale OpenPGP
___
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng