Centroid.EU Blog

(this blog is mostly encrypted - adults only)

Previous Page

Reading Glenn Greenwald's book

November 16th, 2014

Remember Snowden? The journalist who had first contact with Snowden has written a book. I bought it, it's in german, not sure if you can get this book in english or not. The first 64 pages have been interesting but most of the story I already knew. Interesting was that Laura Poitras who recently released her film "citizenfour" was there since the start as well.

I asked the bookstore owner where I bought the book if Snowden is getting any proceeds from this book, and he was doubtful. Oh well, that's all I wanted to show.


Delphinusdnsd is born

November 14th, 2014

The new tree was imported at the delphinus CVS repo. Delphinus DNS is the replacement name for Wildcarddnsd and from this day forward it will carry on development. I plan on putting in DNSSEC this release cycle, and delphinusdnsd will be released with version RELEASE_1_0 tag right away (as 1.0.0) next year around November 15th. Some commits were already made to this new tree, to wipe the old name away.


Reflections: Nine years of wildcarddnsd

November 13th, 2014

November is the birthmonth for wildcarddnsd. Back in 2005, I was job-less, angry, and living on welfare, when I started to code on wildcarddnsd. It was my escape from an uncertain future, a future that didn't have me hold a job again. Well that turned out to be false. I did get a job 5 years later and things started to go uphill again. But all throughout the time I was unemployed and employed I took pleasure in writing for wildcarddnsd. Thanks W for all that! And thanks to everyone who supported me. Now that wildcarddnsd has been renamed I'm gonna have to say D instead of Double-U. I'm glad you exist D, and I hope to see you flourish into a full-fledged general purpose nameserver. Time will tell!


Wildcarddnsd 0.9.0 will be released tomorrow

November 13th, 2014

Here a sneak preview of what it has for new features from it's new legacy homepage.

  • A new YACC parser
  • SPF (RFC 4408) support
  • SSHFP (RFC 4255 + 6594) support
  • EDNS0 (RFC 6891) support
  • NAPTR (RFC 2915) support
  • Notify (RFC 1996) master-only support
  • filters and ratelimiting (up to 127 pps)
  • a wildcarddns.conf manpage
  • and more...

This is the last release under the name "wildcarddnsd" the project has been renamed delphinus dnsd. Enjoy!


Wildcarddnsd 0.9.0 Beta Release next Week

November 8th, 2014

One more week. I did some finishing touches today and then next week the BETA_9 release will be done. Be sure to download your copy if you've been using Wildcarddnsd, then. Also this may be the last release with the Wildcarddnsd name, I've been thinking of renaming it to avoid confusions that happen to pop up once in a while. The wildcarddnsd home page is at wildcarddns.centroid.eu.


Graphing DNS queries

November 5th, 2014

DNS doesn't take much traffic when the TTL is high enough. (like mine). I have graphed a few weeks worth of wildcarddnsd data, spikes are probably when I wrote to a mailing list.

I was graphing most of yesterday and decided to do the above today as well. RRDTOOL++!


Careful of a FritzBox downgrade!

November 2nd, 2014

I downgraded my Fritzbox from 6.20 to 6.04, and it turns out the saved config is not backwards compatible. So after a lot of trying and not finding the DSL access codes I had to take it back to 6.20 and restore the config. It's a good thing that was possible. I then utilized my UDPTUNNEL program this morning and it's working like a charm. I guess the FB analyses TCP and does bad things with it.


Upgraded Uranus(computer) to OpenBSD 5.6

October 30th, 2014

With patches (errata) applied, it looks like this:

# sysctl kern.version
kern.version=OpenBSD 5.6 (URANUS.MP) #0: Thu Oct 30 09:57:34 CET 2014
I'll do the rest on saturday when packages are available.


Proud owner of 5.6 CD's

October 29th, 2014

I have made prepwork to make mercury 5.6 tomorrow and I'll do the rest of the network here on saturday I guess. Yes OpenBSD!


When TCP is blocked/manipulated...

October 26th, 2014

then we tunnel! In the following article I showed proof that the DTAG network is screwed up. The problem persists, and I have done a new thing to circumvent this screwing up. I have started to tunnel.

$ ifconfig gif0
gif0: flags=8051 mtu 1280
        priority: 0
        groups: gif
        tunnel: inet ->
        inet6 fe80::ca5:8ff4:dd1c:99fb%gif0 ->  prefixlen 64 scopeid 0x6
        inet --> netmask 0xff000000
right now everything works as it should and I have none of the retransmission and delays I was talking about earlier. This is further proof that DTAG is using some sort of Deep Packet Inspection that causes these screwups.
# ping 
PING ( 56 data bytes
64 bytes from icmp_seq=0 ttl=255 time=58.851 ms
64 bytes from icmp_seq=1 ttl=255 time=62.127 ms
64 bytes from icmp_seq=2 ttl=255 time=64.028 ms
--- ping statistics ---
3 packets transmitted, 3 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 58.851/61.668/64.028/2.157 ms
Nuff said.


Next Page


RSS Feed

Click here for RSS

On this day in

Other links

Have feedback?

By clicking on the header of an article you will be served a cookie. If you do not agree to this do not click on the header. Thanks!

Using a text-based webbrowser?

... such as lynx? Welcome back it's working again for the time being.

Older Blog Entries

Powered by BCHS