serverok.pl is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
lonely small server
Admin email
postmaster@serverok.pl
Admin account
@mend0za@serverok.pl

Search results for tag #dns

Jason Weatherly »
@jamesthebard@social.linux.pizza

The standalone Proxmox server is basically done at this point, all three DNS servers are online and secure, the Tailscale VM is online after completely forgetting that it was running on one of the Raspberry Pis, and the `authentik` instance that I'm gonna need to work on tomorrow.

A screenshot of a Proxmox virtualization server with 5 VMs on it running on an 8C/16T AMD CPU with 32GiB of RAM.

Alt...A screenshot of a Proxmox virtualization server with 5 VMs on it running on an 8C/16T AMD CPU with 32GiB of RAM.

    Kal Feher »
    @kalfeher@infosec.exchange

    The world decided not to call multistakeholer internet governance mean names: news.un.org/en/story/2025/12/1
    As someone who had to think about how transitioning internet root management would work, I always wonder how the scary UN takeover would be accomplished. That's been postponed. Yay! hopefully there'll be less arguments about governance, allowing airtime for other important arguments about AI and global junkets. also yay!
    Here is auDA's writeup auda.org.au/news-insights/blog

      Kal Feher »
      @kalfeher@infosec.exchange

      AWS Lambda functions changed the link local address for the internal resolver. for reasons.

      caused some of my CDS monitoring functions to fail. I've fixed it now and am in the process of adding some resilience.
      kalfeher.com/analysis/cds-char

        Paco Ho Ho Hope 🎄 »
        @paco@infosec.exchange

        RE: hachyderm.io/@dotmeow/11574754

        I’m planning to back this. Just have to negotiate with the family CFO on how much. I wants some meows!

          Miek Gieben »
          @miek@mastodon.cloud

          let's do DELEG server side. How do I test? I DO NOT want to write my own testing code in parallel

            Peregrine Fleuré Tremayne »
            @pft@infosec.exchange

            RE: infosec.exchange/@pft/11573998

            Less than half an hour: make sure to show the world that you know how to operate .

              Miek Gieben »
              @miek@mastodon.cloud

              I need to transfer zone data, should I use the technique from 1987 or the new and improved one from 1996?

                Infoblox Threat Intel »
                @InfobloxThreatIntel@infosec.exchange

                👩‍💼👨‍💼 LinkedIn Link Leading to Looted Login? 🧟🔐 [2/2]

                The site continues the ruse that the account is "temporarily restricted" and asks to "Verify your identity":

                🐟 Mimics a login page and prompts for LinkedIn credentials (the Google, Microsoft, and Apple sign-in buttons seemingly do nothing)
                🐟 Entered credentials are sent to the threat actor via a Google Apps Script, along with the victim's IP address and geolocation
                🐟 Potential MFA bypass attempts:
                🙀 Asks for confirmation of the sign-in attempt within the LinkedIn app
                🙀 Warns that the 'login attempt seems suspicious' and asks for the 'verification code sent via email' to be entered

                At this point an "Appeal submitted" page is typically displayed, although on one occasion we were prompted to upload a snap of our passport, driver's license or national ID card as access to our account was "temporarily restricted".

                Regardless of the outcome, both 'success' pages suggest that someone posing as LinkedIn might make contact, perhaps a hint of further social engineering!

                Screenshots showing the phishing site

                Alt...Screenshots showing the phishing site

                Screenshots showing the phishing site

                Alt...Screenshots showing the phishing site

                  Infoblox Threat Intel »
                  @InfobloxThreatIntel@infosec.exchange

                  👩‍💼👨‍💼 LinkedIn Link Leading to Looted Login? 🧟🔐 [1/2]

                  LinkedIn users should watch out for fake 'policy violation' messages, especially if you're the sharing type!

                  Over the past week, we've seen a threat actor masquerading as LinkedIn Security and posting replies to various posts:

                  "Hello, your post has violated LinkedIn's policies. Please appeal here: https://lnkd[.]in/<SHORT_URL>;
                  otherwise, your account will be permanently banned within 24 hours."

                  Given the legitimate LinkedIn short URL and the abuse of LinkedIn's branding in the attacker profile, some may be tempted to click and find themselves redirected to a phishing domain.

                  These domains are currently using the naming convention 'linkedverifycase' followed by some random numbers, for example:

                  🚨 linkedverifycase1289[.]com
                  🚨 linkedverifycase12168[.]com
                  🚨 linkedverifycase859369[.]com

                  Image showing the post reply from threat actor masquerading as LinkedIn Security

                  Alt...Image showing the post reply from threat actor masquerading as LinkedIn Security

                    eternalyperplxed »
                    @eternalyperplxed@infosec.exchange

                    Was getting intermittent DNS resolution failures, latency, and general instability when using Pi-Hole -> Unbound resolver on OpnSense. Unbound logs were showing multiple SERVFAIL and NXDOMAIN messages. Checked MTU, NAT, and firewall rules, all configured properly.


                    1/2

                      eternalyperplxed »
                      @eternalyperplxed@infosec.exchange

                      Switched Unbound to forward to Quad9 and other public DNS servers and the issues immediately went away. Has anyone seen this type of issue before? Are there specific settings needed for Unbound to reliably connect to root DNS servers? I tried with and without DNSSEC.


                      2/2

                        Infoblox Threat Intel »
                        @InfobloxThreatIntel@infosec.exchange

                        Think parked domains are no big deal? Think again! These domains might seem benign on the surface, but our investigation into the risks of visiting parked domains might surprise you. In fact, if you were to visit a parked domain and actually see that typical park page, consider yourself lucky. Today, visits to these parked domains, which often happen accidentally, have become a source for traffic distribution systems, using a technique referred to by some as direct or zeroclick searches. In our experience this technique is much more likely to send you to threats like scams and malware. ClickFix? Sure. Results resembling what you were actually seeking? Not likely. To see what we found, check out our blog: blogs.infoblox.com/threat-inte

                          1 ★ 1 ↺
                          d4s boosted

                          mend0za »
                          @mend0za@serverok.pl

                          Тернистый Путь Греха в сетапе личного PrivateDNS для Android со встроенной баннеро-резалкой.

                          Весь мой вчерашний и позавчерашний день, в борьбе с Unbound , DNS-over-TLS , #letsencrypt, AppArmor и, естественно , Linux.

                          #unbound опять не запускается

                          Alt...#unbound опять не запускается

                          #AppArmor мешает #unbound читать сертификаты #letsencrypt

                          Alt...#AppArmor мешает #unbound читать сертификаты #letsencrypt