(…)
Daily Archives: 30. Juni 2022
Open DNSSEC Validating Resolvers
What is the CZ.NIC ODVR?
CZ.NIC ODVR are Open DNSSEC Validating Resolvers that you might freely use instead of the standard DNS resolvers offered by your Internet service provider.
What is DNS?
DNS (Domain Name System) acts like a phone directory for the internet IP addresses. It pairs the numeric IP addresses with labels, called domain names, that a user can easily remember and type in their web browser (e.g., if they look for a company called XYZ, they type in www.xyz.com). Just like a phone, the browser then searches the „directory“, looks up the right record, automatically connects to an IP address assigned to that domain name and finally displays the company‘s webpage to the user.
More information is on the page About domains and DNS.
What is DNSSEC?
DNSSEC is an extension to the Domain Name System (DNS) that enhances its security. DNSSEC guarantees its users that the information they have received from DNS was provided by a right source, is complete and its integrity has not been tampered with. DNSSEC ensures the credibility of DNS information.
More information can be found on the page How DNSSEC works.
How to setup CZ.NIC resolvers?
Change your network configuration so that it uses resolvers with IP addresses 193.17.47.1 and 185.43.135.1.
(…)
You can verify the correctness of your setting via the test bellow.
CZ.NIC ODVR
CZ.NIC ODVR CZ.NIC ODVR are Open DNSSEC Validating Resolvers. CZ.NIC neither collect any personal data nor gather information on pages where devices sends personal data.
Protocol Address
DNS, IPv4 193.17.47.1 and 185.43.135.1
(…)
DNS-over-TLS tls://odvr.nic.cz
simplewall
Features
– Simple interface without annoying pop ups
– Rules editor (create your own rules)
– Internal blocklist (block Windows spy / telemetry)
SWITCH Public DNS
Host name (DoT):
dns.switch.ch
(…)
IP addresses:
130.59.31.248
130.59.31.251
Verschlüsseltes DNS (DoT) mit der FritzBox nutzen
(1. November 2020)
Unverschlüsselte DNS-Anfragen sind eine potentielle Gefahr für die Privatsphäre und bieten einen einfachen Angriffspunkt für Manipulation.
Derzeit kämpfen zwei konkurrierende Standards darum, diese Probleme zu beheben. DoT (DNS-over-TLS) und DoH (DNS-over-HTTPS). AVM hat sich entschieden mit den FritzBox-Routern DoT zu unterstützen. Seit Firmware 7.20 ist diese Option verfügbar.
Black Hat 2021: DNS loophole makes nation-state level spying as easy as registering a domain
(Aug 4, 2021)
We have no way of knowing whether the loophole has already been exploited: Anyone could have collected data undetected for over a decade.
We do know this is still an active threat vector – while two major DNS providers (Amazon and Google) have fixed the issue, others may still be vulnerable. As a result, millions of devices are potentially vulnerable.
(…)
After analyzing it, we learned it was dynamic DNS traffic from Windows machines that were querying the hijacked name server about itself. Dynamic DNS keeps DNS records automatically up to date when an IP address changes. It’s traditionally been used in large networks that host internal services, and use their own internal servers. In short, the traffic we received contained sensitive information that was never supposed to leave an organizations internal network.
The dynamic DNS traffic we “wiretapped” came from over 15,000 organizations, including Fortune 500 companies, 45 U.S. government agencies, and 85 international government agencies. The data included a wealth of valuable intel like internal and external IP addresses, computer names, employee names and office locations.
3 things I wish from @github: – faster website (also in the actions tab) – nixos support for actions as first level citizen – TLS 1.3 in github actions
(7 May 2020)
TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys
(April 6, 2020)
Asymmetric encryption is used during the “handshake”, which takes place prior to any data being sent. The handshake determines which cipher suite to use for the session – in other words, the symmetric encryption type – so that both browser and server agree. The TLS 1.2 protocol took multiple round trips between client and server, while TLS 1.3 is a much smoother process that requires only one trip. This latency saving shaves milliseconds off each connection.
Filterlisten für Internetseiten erstellen
Tragen Sie die Adressen der Internetseiten, deren Aufruf Sie verbieten bzw. erlauben wollen, in der jeweiligen Filterliste ein:
1. Klicken Sie in der Benutzeroberfläche der FRITZ!Box auf „Internet“.
2. Klicken Sie im Menü „Internet“ auf „Filter“.
3. Klicken Sie auf die Registerkarte „Listen“.
4. Klicken Sie neben der benötigten Liste auf den Link „bearbeiten“.
5. Tragen Sie die Internetadressen ohne Präfix wie http, https oder www in das Eingabefeld ein. Drücken Sie nach Eingabe jeder Adresse die Leertaste.
Beispiel:
poker.com xxx.com aggro.tv
Klicken Sie zum Speichern der Liste auf „Übernehmen“.
Jetzt sind die Filterlisten eingerichtet.
Ex-Amazon Cloud Worker Found Guilty in Capital One Hack: The huge hack affected more than 100 million US customers.
(June 18, 2022)
„She wanted data, she wanted money, and she wanted to brag,“ Assistant United States Attorney Andrew Friedman said in closing arguments, according to the release. The Justice Department didn‘t identify the other organizations affected by Thompson‘s activity.
Firefox is making connections to cloudfront.net and locprod.prod.mozaws.net on startup
(27.07.2020)
No replies
(…)
Why does make Firefox makes those connections?
What is transmitted?
And How can I disable them?
Amazon Disables NSO Group CloudFront Accounts To Prevent “Pegasus” PR Crisis
(July 19, 2021)
While this was unearthed in 2020 itself, Amazon declined to take any action or even comment on the story. Now, Pegasus is linked to human rights abuse around the world. So Amazon has shut down the CloudFront accounts linked to NSO Group. For the uninitiated, CloudFront is a content delivery network by Amazon.
The Details About the CIA‘s Deal With Amazon
(July 17, 2014)
This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks.
For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency
Frisch aus der Entwicklung
Dieses FRITZ! Labor enthält neue Funktionen frisch aus der Entwicklung und erlaubt heute schon einen Ausblick auf zukünftige FRITZ!OS-Funktionen des nächsten großen Updates.
Neue Funktionen in FRITZ!OS 7.39
Internet:
NEU IP-Sperrliste für einkommende Pakete
Für FRITZ!Box 6591 Cable und 6660 gibt es im FRITZ! Labor jetzt ebenfalls neue Versionen zum Ausprobieren. Jetzt herunterladen und Feedback abgeben:
Israel‘s Lawmakers to Vote to Dissolve Knesset; Lapid to Become PM
The wording of the approved bill sets November 1 as the date elections will be held.
If the vote passes, Lapid will assume the position of prime minister on Thursday at midnight, replacing his coalition partner Naftali Bennett, who on Wednesday evening announced that he would not run in the upcoming election.
Indonesian President hands over invitation to Zelensky to personally attend G20 summit
He noted the need for a peaceful resolution of the conflict. Widodo said he would soon meet with Russian President Vladimir Putin and express his desire for peace.
„I will have a meeting very soon with President Putin, and I will also express our desire for peace to him,“ the Indonesian president said.
Russian occupiers preparing provocation accusing Ukrainian nuclear scientists of storing weapons at ZNPP – Energoatom
„For this, several workers were detained and tortured with a demand of confession, or rather, slandering themselves, that they allegedly dropped some kind of weapon into the concrete bowls of the cooling pools at Zaporizhia NPP in March,“ the company informed.
The company explained the invaders, under this pretext, insist on draining the cooling pools – to check its bowls – and stopping the pumps that supply water to the security systems of power units.
„If this happens, then the security systems of Europe‘s largest nuclear power plant will be left without cooling, which in itself is a serious violation and can threaten nuclear safety.