Max Resing
@resingm.infosec.exchange.ap.brid.gy
2 followers 1 following 87 posts
Passionate about networking protocols, the Internet, how to measure it and big data. Overall a curious mind and problem solver. Interests & profession […] [bridged from https://infosec.exchange/@resingm on the fediverse by https://fed.brid.gy/ ]
Posts Media Videos Starter Packs
resingm.infosec.exchange.ap.brid.gy
Looking into #alternative #dns roots. Wikipedia has a list of active ones. Did you know, that #russia has their own (for ISPs mandatory) DNS root?

Alternative DNS root - Russian National Domain Name System.
resingm.infosec.exchange.ap.brid.gy
Sweet. It looks like #tails #linux 7.0 was just released. It is based on the latest #debian13 release. Time to ditch my old Tails VM and setup a new one tomorrow.

Announcement is here:
https://tails.net/news/version_7.0/

#tor #privacy
Tails - Tails 7.0
tails.net
resingm.infosec.exchange.ap.brid.gy
Yesterday, 10 years ago, Let's Encrypt issued their first #tls #certificate to the domain name `helloworld.letsencrypt.org`. Since then, they issued 7 billion certificates.

To quote Borat: "Great success!"

Congrats!

#letsencrypt #tls #ssl #https
resingm.infosec.exchange.ap.brid.gy
It is rumored that a #ddos attack happened during the local #elections in the city of #Münster, and surrounding regions. #wdr reports that a bunch of IP addresses send millions of requests. I was not able to check tje results myself at times on the official platform #citeq.

Have not anything […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
"With dove season in full swing, we ask all our customers to please be
mindful of their surroundings and avoid shooting doves on or near
fiber/electric lines."

* Lexington Electric Systems, from the NANOG mailing list

This must be a very #us centric problem of #internet service providers […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
@jtk - "Long past time to abandon" Perl ? 😄

Just joking :)
resingm.infosec.exchange.ap.brid.gy
So, while working on some #botnet research, I discovered a domain for which a #nameserver was configured with the name `ns1.nulled-ns.com` and `ns2.nulled-ns.com`. As more I figure out about this unknown authoritative nameserver, as more I am convinced that the entire purpose of the nameserver […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
Big leap forward on #internet #governance in #canada: By November 04, ISPs are required to report major outages within 2 hours and must hand in a post-mortem 30 days following the incident. The proclaimed goal is to strenghten transparency in the short term, and resiliency in the long term […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
@jmeyer - Thanks Jérôme, I just read the tooltip on the page, as an example RIPE's `k.root-server.org` (screenshot).

Hosting would make sense, since the majority of root server instances are likely hosted in commercial (Internet) DCs, I guess.
A screenshot of IPInfo's website of the `k.root-servers.org` server with the tooltip open to show a quick help on what the "Privacy" flag means.
resingm.infosec.exchange.ap.brid.gy
Do not read this as critique to #ipinfo, but I am surprised to see that the `b`, `i`, `k`, `l` and `m` #dns root servers have the "privacy" flag set, meaning the IPs attempted to "hide" themselves.

All 13 root server IPs are flagged as #anycast. I thought, there are still ~some~ servers not yet […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
Exciting to share that #polars made it's first move into #distributed processing. They announced Polars Cloud just recently.

To me, it looks like self-hosting is on the agenda. I am waiting patiently :)

#datascience #dataengineering #distributedsystems #python
Index - Polars user guide
docs.pola.rs
resingm.infosec.exchange.ap.brid.gy
@jtk - It is a learning curve, but you will see that Polars is much more streamlined and consistent :) I am working with Polars for ~2years now, and I can't turn back to pandas...
resingm.infosec.exchange.ap.brid.gy
Looks like there is a typo squatting attack going on to harvest #container #registry login #credentials of #ghcr:

https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/

Be safe out there!

#github #docker #podman #kubernetes #phishing #devops
ghrc.io Appears to be Malicious
Comments
bmitch.net
resingm.infosec.exchange.ap.brid.gy
It's been a few days that the #gfw was observed to block off all TCP/443 connections for around 2 hours on August 20.

What do you folks speculate might have been the reason behind it?

#china #censorship #greatfirewall
resingm.infosec.exchange.ap.brid.gy
The Great Firewall Report publishes some research on how #china cut-off all `TCP/443` (inbound and outbound) with `TCP RST+ACK` packet injections through the #greatfirewall .

Intimidating, how a nation can isolate their entire population from the common #internet .

#censorship #gfw
Analysis of the GFW's Unconditional Port 443 Block on August 20, 2025
Comments
gfw.report
resingm.infosec.exchange.ap.brid.gy
I am just wondering, and this is a question to the #infosec community:

Can't you migrate a #tld from one server to another including #dnssec by first testing your setup with a #canary zone? #cloudflare speaks about challenges in having RSA/SHA256 on #verisign's end, but ECDSA P-256 on their end […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
Anyone interested in #operational #dns #challenges : #cloudflare also presented the migration of the `.gov` at #dnsoarc :

https://indico.dns-oarc.net/event/48/contributions/1038/attachments/1005/1948/gov-transition-nsec-nsec3.pdf
resingm.infosec.exchange.ap.brid.gy
In January 2023, #cloudflare replaced #verisign in providing #dns #registry services for the `.gov` #tld. Besides the registry, they also run the authoritative #nameservers.

Verisign ran it for 12 years, and cost the #us #government apparently just half as much as Cloudflare charges ($7.2M) […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
@gme - I see. You are rather looking for an umbrella mailing list, that incorporates all fediverse/activity pub projects?

In that case, I stick to my recommendation, what changes is the website you should look for. There are projects/platforms that tackle the fediverse in a whole. Those would […]
Original post on infosec.exchange
infosec.exchange
resingm.infosec.exchange.ap.brid.gy
@gme - I like the idea. Albeit, I am no #mastodon #operator, I would suggest to reach out to the developers in #germany . Perhaps they like the idea and provide some help.

https://joinmastodon.org/about#impressum
Reposted by Max Resing
briankrebs.infosec.exchange.ap.brid.gy
Having lost more hours to reading criminal complaints over the years than I care to remember, I can confidently state that I have never encountered one as entertaining and complete as the one that dropped today, charging a 22 y/o Oregon man with operating […]

[Original post on infosec.exchange]
The control panel for the Rapper Bot botnet greets users with the message “Welcome to the Ball Pit, Now with refrigerator support,” an apparent reference to a handful of IoT-enabled refrigerators that were enslaved in their DDoS botnet.
resingm.infosec.exchange.ap.brid.gy
I agree, John! From a researcher's perspective, it is interesting to keep an eye on it. These projects circumvent any moderation, which tends to attract illicit activity.
resingm.infosec.exchange.ap.brid.gy
This threat here suggests that more activity stems again from the #opennic parallel #dns #root .

Not sure, if more activity, and a reborn of the #opennicproject leads to less or more abuse from the system. Any opinions from the #infosec community?

#askfedi #askinfosec
discuss - [opennic-discuss] Failed TLDs for removal - arc
lists.opennicproject.org