Why we can't have nice private TLD DNSSEC
21 points by egberts1 1 month ago | 5 comments- AStonesThrow 1 month agoIronically, Chrome treats me to:
So the privacy of egbert.net is especially ensured?ERR_SSL_VERSION_OR_CIPHER_MISMATCH
- pixl97 1 month agoLooks like safari and Firefox are supported
- zinekeller 1 month agoApparently Chrome does not support secp521r1 EC/DH key exchange. secp521r1... should probably be avoided unless you're targeting FIPS standards (too much security, also designed by NSA) but "higher bits" apparently are sexier than having a more rigorous algorithm than x25519.
... or probably this is very intentional move to block Chrome?
- AStonesThrow 1 month agoI'd be interested to know how you traced this. I dove into the rabbit hole, and used ssllabs.com for a client browser check. I compared the client with the server to note that the server, very strict in its protocols, accepts only TLS v1.3 (check) and only a single CHACHA cipher (check) so I could not see why they were not connecting. Now I do see that Chrome only does ecdh secp384r1 or 256, but that was fine print, and I did not understand its importance.
An attempt to fetch the blog URL with http: also failed with a 404.
Anyway, I did find the blog article, dated May 2022, on the Wayback Machine, in two old snapshots, and attempting to take a snapshot today failed. The W3C Validator was able to fetch and parse anyway.
There was no particular indication of browser compatibility in the blog post. But a very opinionated piece on DNSSEC indeed.
- pixl97 1 month agoShould be able to do something like an
OpenSsl s_client -connect egbert.net:443
And get more information.
- pixl97 1 month ago
- AStonesThrow 1 month ago
- pixl97 1 month ago