serverok.pl is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
lonely small server
Admin email
postmaster@serverok.pl
Admin account
@mend0za@serverok.pl

Search results for tag #dns

Jote 🏳️‍🌈 :verified_gay: »
@ailnoth@social.plux.wtf

So... I finally took the leap and replaced my internal from to and still do network level ad block and stuff like that.

The image shows the Technitium DNS Server dashboard for dns01.intern.plux.wtf. At the top, there’s a dark-themed interface with navigation tabs (Dashboard, Zones, Cache, Allowed, Blocked, Apps, DNS Client, Settings, DHCP, Administration, Logs, About).

In the main stats bar:
	•	81 total queries in the last hour.
	•	61 (75.31%) resolved with no error.
	•	15 (18.52%) server failures.
	•	5 (6.17%) NX Domain.
	•	64 (79.01%) recursive responses.
	•	14 (17.28%) cached responses.
	•	3 (3.70%) blocked.
	•	No refused, authoritative, or dropped queries.
	•	9 clients are connected.

Below that, a line graph shows a flat baseline of zero queries across time until a sharp spike near the end.

At the bottom left, there’s a donut chart showing proportions of authoritative, recursive, cached, blocked, and dropped queries. Bottom right lists system stats:
	•	5 zones
	•	570 cache entries
	•	0 allowed/blocked/allow list entries
	•	Over 1.19 million entries in the block list

Alt...The image shows the Technitium DNS Server dashboard for dns01.intern.plux.wtf. At the top, there’s a dark-themed interface with navigation tabs (Dashboard, Zones, Cache, Allowed, Blocked, Apps, DNS Client, Settings, DHCP, Administration, Logs, About). In the main stats bar: • 81 total queries in the last hour. • 61 (75.31%) resolved with no error. • 15 (18.52%) server failures. • 5 (6.17%) NX Domain. • 64 (79.01%) recursive responses. • 14 (17.28%) cached responses. • 3 (3.70%) blocked. • No refused, authoritative, or dropped queries. • 9 clients are connected. Below that, a line graph shows a flat baseline of zero queries across time until a sharp spike near the end. At the bottom left, there’s a donut chart showing proportions of authoritative, recursive, cached, blocked, and dropped queries. Bottom right lists system stats: • 5 zones • 570 cache entries • 0 allowed/blocked/allow list entries • Over 1.19 million entries in the block list

    Nate Metzger »
    @nathan@mastodon.alphapuggle.dev

    If you don't have a scrollbar on your are you even properly?

    Cloudflare DNS pagination "1 to 50 of 56 records added"

    Alt...Cloudflare DNS pagination "1 to 50 of 56 records added"

      Miek Gieben »
      @miek@mastodon.cloud

      ok, this morning, properly support cnames.. LOLWAT
      "If so, the name server includes the CNAME
      record in the response and restarts the query at the domain name
      specified in the data field of the CNAME record. The one exception to
      this rule is that queries which match the CNAME type are not restarted."

      I can safely say the file plugin in coredns isn't up to the RFC spec

        B'ad Samurai 🐐 »
        @badsamurai@infosec.exchange

        The domain calivpn[.]com* is available if you wanted random Fedi business idea.

        therecord.media/california-leg

        • Remember to defang DNS jokes. What if your joke becomes malware in the future?

          Max Resing »
          @resingm@infosec.exchange

          So, while working on some research, I discovered a domain for which a was configured with the name ns1.nulled-ns.com and ns2.nulled-ns.com. As more I figure out about this unknown authoritative nameserver, as more I am convinced that the entire purpose of the nameserver is to provide name services for malicious domain names, such as or domain names.

          Happy about anyone commenting, or reaching out to me with more insights.

          Cheers!

            IceQbe :verified: »
            @iceqbe@infosec.exchange

            @jcphoenix

            The MagicDNS feature, combined with automatic let's encrypt certificates and tsdproxy has let me remove port forwarding from my firewall and selfhosting my services only on the tailnet.

            Also nebula nebula.defined.net/docs/

              T.F.G. »
              @TFG@social.linux.pizza

              Wow... That's my . That's 100% me.

              Registered the first domain in 23 years. Wantd to host my own relay. Coosing exactly the one company to register it from which has a bug in its DNS records system that prevents me from correctly setting the CAA record.

              The value should be:

              "letsencrypt.org;accounturi=..."

              But the record editor errors out if there's no space after the ;

              So the record I was forced to set is now

              "letsencrypt; accounturi=..."

              Contacted the support, after waiting some hours for answer they told me that's actually a bug and they reported it to the dev team... Which will hopefully solve it somewhere in the future.

              Great... This not only gives a warning when doing

              scripts/cmdeploy dns

              I don't even know if the CAA record does work the way it should.

              But the worst thing... my nightmare... is this one warning from "cmdeploy dns". The one and only warning left... it triggers my inner Monk the hard way. Sigh.

                h3artbl33d :openbsd: :ve: »
                @h3artbl33d@exquisite.social

                Erm, fellow Fediverse hackers: did I miss something?

                I was just told that I should use SHA256 hashes, rather than SHA512 for MTA DANE (meaning: eg 3 1 1 rather than 3 1 2).

                Is this correct? I fail miserably at finding the corresponding RFCs.

                  1 ★ 1 ↺
                  d4s boosted

                  mend0za »
                  @mend0za@serverok.pl

                  Тернистый Путь Греха в сетапе личного PrivateDNS для Android со встроенной баннеро-резалкой.

                  Весь мой вчерашний и позавчерашний день, в борьбе с Unbound , DNS-over-TLS , #letsencrypt, AppArmor и, естественно , Linux.

                  #unbound опять не запускается

                  Alt...#unbound опять не запускается

                  #AppArmor мешает #unbound читать сертификаты #letsencrypt

                  Alt...#AppArmor мешает #unbound читать сертификаты #letsencrypt