GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Thomas Steen Rasmussen (tykling@mastodon.social)

  1. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 08-May-2025 15:02:37 JST Thomas Steen Rasmussen Thomas Steen Rasmussen

    I've been waiting for #FreeBSD packaged base for two decades so I could get rid of sendmail and now pkgbase is finally here but sendmail was already removed in 14

    In conversation about 4 days ago from mastodon.social permalink
  2. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Tuesday, 18-Mar-2025 12:12:00 JST Thomas Steen Rasmussen Thomas Steen Rasmussen

    Is there some fedi account I can follow which will tell me when there is space stuff I should go outside and look up at?

    I hate missing stuff like auroras :/

    It would have to be something where one can follow an account specific for the area one lives in, Denmark in my case.

    #askfedi

    In conversation about 2 months ago from mastodon.social permalink
  3. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Friday, 31-Jan-2025 15:14:41 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    https://github.com/tykling/ansible-roles/blob/master/freebsd_host/templates/netif.j2#L6 i do this @dvl @feld

    In conversation about 3 months ago from mastodon.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      ansible-roles/freebsd_host/templates/netif.j2 at master · tykling/ansible-roles
      Ansible roles shared between my different Ansible installations - tykling/ansible-roles
  4. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Monday, 09-Sep-2024 05:00:14 JST Thomas Steen Rasmussen Thomas Steen Rasmussen

    If you don't (regularly!) donate to Mozilla to support the development of Firefox you have zero right to complain about them adding AI and other stuff.

    How in the the hell are they supposed to fund their operation? Developing a browser is not cheap. They _have_ to try dumb shit like VPNs and AI and whatnot just to survive!

    If you want that to stop then give them an alternative by donating: https://foundation.mozilla.org/en/donate/

    In conversation about 8 months ago from mastodon.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: assets.mofoprod.net
      Donate Now
      We are proudly non-profit, non-corporate and non-compromised. Thousands of people like you help us stand up for a healthy internet for all. We rely on donations to carry out our mission to keep the Web open and free. Will you give today?
  5. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 11-Jan-2024 08:56:38 JST Thomas Steen Rasmussen Thomas Steen Rasmussen

    How do I debug something leaking nmbclusters on a bird2 BGP router (no full feed) on #FreeBSD 13?

    In conversation Thursday, 11-Jan-2024 08:56:38 JST from mastodon.social permalink
  6. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Friday, 15-Dec-2023 00:00:24 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    @feld like .02% of a core, nothing noticable on my systems at least. But sure, I agree it would be great if node_exporter just included this stuff. gstat_exporter will be there until it does.

    In conversation Friday, 15-Dec-2023 00:00:24 JST from mastodon.social permalink
  7. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 14-Dec-2023 23:51:59 JST Thomas Steen Rasmussen Thomas Steen Rasmussen

    Today I tagged v0.2.0 of gstat_exporter, a Prometheus exporter for FreeBSD gstat(8) data: https://github.com/tykling/gstat_exporter/releases/tag/v0.2.0

    It is available on PyPi now: https://pypi.org/project/gstat-exporter/

    I have opened a PR to update the #FreeBSD port: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275762

    I have also updated the Grafana dashboard to use some more modern panels: https://grafana.com/grafana/dashboards/11223-freebsd-gstat-exporter/

    I will tag v1.0.0 of gstat_exporter soon if no issues appear with the changes I've made over the last couple of days. If you use it please test! Thanks :)

    In conversation Thursday, 14-Dec-2023 23:51:59 JST from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/111/579/182/837/771/079/original/1e2e91fe45d1e18d.png

    2. https://files.mastodon.social/media_attachments/files/111/579/182/895/190/664/original/867703e7262ba15c.png

    3. https://files.mastodon.social/media_attachments/files/111/579/182/937/234/353/original/edd70cb232b7b7de.png


    4. No result found on File_thumbnail lookup.
      Invalid Bug ID

  8. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 16-Nov-2023 05:34:21 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    @feld maybe you want an NS record, I want a CNAME. Making a delegation and seperate zone for every challenge sounds very ineffective to me, but whatever works for you.

    A CNAME does exactly what is needed, and as a bonus it can carry the name being challenged in the CNAME target (below the challenge zone), so:

    _acme-challenge.www.example.com CNAME www.example.com.acme.example.org

    Anyway, we clearly have different views on this, which is fine. I am not on bikeshed.party, so I will stop here :)

    In conversation Thursday, 16-Nov-2023 05:34:21 JST from mastodon.social permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Example Domain
  9. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 16-Nov-2023 03:39:40 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    @feld I agree that DNS-01 should be pushed, and pinned. ACME tools should check for CAA records and recommend they be added.

    But IMO you should never let any tool on an internet-facing server edit your zone directly, or an attacker compromising the server can also edit your zone.

    Instead you should make CNAMEs for the _acme-challenge records to a dedicated subzone which is used exclusively for ACME challenges. This has all the advantages of DNS-01, but doesn't hand over control of your zone :)

    In conversation Thursday, 16-Nov-2023 03:39:40 JST from mastodon.social permalink
  10. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 16-Nov-2023 02:37:56 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    @feld I believe LE currently does DNS checks from multiple AWS regions + from their own servers. So they likely would have gotten inconsistent answers and bailed out at that point. I don't know about ZeroSSL.

    The attackers likely had to try issuing multiple times to get lucky and have all the lookups hit the "bad" server.

    No guarantees here, but I would much, much rather have had CAA account pinning in place than not during this attack.

    In conversation Thursday, 16-Nov-2023 02:37:56 JST from mastodon.social permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      https://oslosportslager.no/oslosportslager.no/index.jsp
  11. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 16-Nov-2023 02:18:59 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    @feld that is what the account pinning prevents. The attacker doesn't control the private keys for the ACME account pinned in the CAA record. ZeroSSL would refuse to issue because the attacker is using a different account.

    In conversation Thursday, 16-Nov-2023 02:18:59 JST from mastodon.social permalink
  12. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 16-Nov-2023 02:13:58 JST Thomas Steen Rasmussen Thomas Steen Rasmussen
    in reply to
    • feld

    @feld you can pin both, no problem with that

    In conversation Thursday, 16-Nov-2023 02:13:58 JST from mastodon.social permalink
  13. Embed this notice
    Thomas Steen Rasmussen (tykling@mastodon.social)'s status on Thursday, 16-Nov-2023 02:11:41 JST Thomas Steen Rasmussen Thomas Steen Rasmussen

    I was investigating an MITM today where the attacker was using a real LetsEncrypt certificate. This was possible because an NS record domain expired and was re-registered by the attacker

    A few weeks ago there was also the jabber.ru MITM issue where a valid LE cert had also been issued.

    Both of these attacks could have been avoided by using CAA account pinning.

    You should add this on all domains today!

    For an example see the CAA record for bornhack.dk https://caatest.co.uk/bornhack.dk

    Spread the word!

    In conversation Thursday, 16-Nov-2023 02:11:41 JST from mastodon.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.jabber.ru
      Jabber.ru
      Jabber.ru — жаббер сервер, вероятно, крупнейший, старейший и самый надёжный


User actions

    Thomas Steen Rasmussen

    Thomas Steen Rasmussen

    Før kommerciel kommer sjæl. Brænd som en bongglød i alt hvad du gør.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          213246
          Member since
          15 Nov 2023
          Notices
          13
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.