blumentopf | 11 years ago
blumentopf's comments
blumentopf | 11 years ago
http://dnsreactions.tumblr.com/post/92623693242/when-tqbf-ag...
blumentopf | 11 years ago
Actually they already did. OS X for instance has this baked into mDNSResponder.
blumentopf | 11 years ago
The money, in our case, came from a large north-european telco with deep pockets. They turned a blind eye to the burn rate for almost 2 years before pulling the plug.
I've heard of a German tech company hiring a philosopher, you know, just for fun. On a superficial level, this might seem comparable to Google hiring Ken Thompson, Guido van Rossum and tytso. In reality however these folks not only boost Google's reputation among developers, they innovate and make a technical contribution to the company. That precisely is the difference between 90's dotcoms' thrift-spending habits and how companies work today. The article misses that completely.
blumentopf | 11 years ago
Got it on eBay for 1 Euro. Eats standard HP LaserJet cartridges that you can find on eBay for just a few bucks.
blumentopf | 11 years ago
http://lists.freebsd.org/pipermail/freebsd-hackers/2013-Sept...
blumentopf | 11 years ago
sysctl -w net.core.rmem_max=4194304
sysctl -w net.core.wmem_max=4194304
Documentation: http://git.kernel.org/cgit/linux/kernel/git/stable/linux-sta...blumentopf | 11 years ago
The ZoL-derived OpenZFSonOSX port inherits ZoL's maturity, runs in kernel space and the OS X integration is really nice (Notification Center integration in ZED, custom icons, etc).
Lovin' it!
blumentopf | 11 years ago
blumentopf | 11 years ago
Turns out he apparently blew a red light with his Boxster in 2010 and hit another car:
http://attitudeofgratitude.typepad.com/attitude_of_gratitude...
blumentopf | 11 years ago
It would be nice if you could make a new key available (RSA with 3072 or 4096 bit) for either the iwanttohack address or your own address, and preferrably link to it on your hiring page. It would underscore your privacy credo and help you stand out from the crowd. (Sadly, even here in the HN Who's Hiring thread, few people have a PGP key and even fewer include it in their job postings.)
blumentopf | 11 years ago
Of course, very few clients support DANE as of yet. Nevertheless, that is the most modern solution and you'll spur adoption of DNSSEC and DANE if you offer it to clients.
blumentopf | 11 years ago
When OS X came out, Steve Jobs promised an OS that would cater to pro users as well as amateurs. He literally said so in one of his keynotes. But around 2006, Apple started focusing on the upcoming iPhone and downprioritized OS X development. Nowadays it's all about making OS X more and more like iOS. They no longer care about pro users.
Case in point: If you're doing pentesting you need a machine that stays silent when connected to a network. With OS X you always have mDNSResponder blaring out. Prior to 10.6 you'd just solve this with a simple "launchctl unload" and be done with it. From 10.6 however, unicast DNS resolution was moved into mDNSResponder, so you need to keep it running or you lose the ability to resolve anything in the DNS. Of course it's possible to filter the multicast DNS announcements with pf, but it turns out that mDNSResponder will occasionally resolve various apple.com and Akamai addresses and that can't be disabled.
Same with IPv6 link-local addressing, it used to be possible to disable it completely, now that's no longer possible because they've dumbed down the UI. And when you use WiFi, OS X will regularly send 802.1X EAPOL messages out. That can't be disabled even with pf because pf doesn't filter on layer 2. Under these circumstances I find OS X to be unusable for pentesting.
And don't get me started on the laughable HFS filesystem and the non-existence of a package manager.
blumentopf | 12 years ago
If you do not trust the Lybian TLD, configure a negative trust anchor for that TLD in your resolver.
Alternatively, if you want to pin that TLD to a particular KSK, configure that KSK as a (positive) trust anchor in your resolver.
If you do not trust the IANA at all, disable the IANA root in your resolver and add trust anchors for the domains you trust. Use lookaside validation if you find that too cumbersome and want to let others do that work for you.
blumentopf | 12 years ago
The private key of the DNS root was split in seven parts held by seven people [1]. It is stored in two HSMs, one on the east coast of the United States, one on the west coast. Could the NSA or some other agency have gotten hold of the private key? Probably. But spinning that as "the DNSSEC root is controlled by the governments" is FUD.
[1] http://venturebeat.com/2010/07/28/seven-security-experts-get...
blumentopf | 12 years ago
For a quick laugh, watch this video of a tourist trip to Silicon Valley they did last year: https://www.youtube.com/watch?v=ug4Rcip9SHg
blumentopf | 12 years ago
blumentopf | 12 years ago
The ISP you're hosting your domains at needs to support this.
blumentopf | 12 years ago
blumentopf | 12 years ago
Is this news to you?
Cf. e.g. http://www.jwz.org/doc/lemacs.html
http://opensource.apple.com/source/mDNSResponder/mDNSRespond...