Conversation

perhaps instead of replying to every post on hacker news with the same thing, because you can't take that a trans girl on the internet wrote about mixing alpine and glibc, you should try reading my post.
Image
4
11
this is actually a point of contention in the alpine community, and we're working on a solution for it, but the best thing developers can (and should) do is use a proper DNS library instead of getaddrinfo(3)
Image
4
15
Replying to
I don't see how that solves anything. You can't expect users to use a nonstandard library in their software. The solution available that works just fine right now is switching to a nonbroken (not Google) recursive, or running caching (+validating 👍) nameserver on ::1.
4
3
Replying to and
I think the nicest setup would be shipping with a minimal unbound as a forwarding-only caching resolver automatically using the DNS servers from DHCP/SLAAC. It'd be nice to have opportunistic DoT by default like AOSP too but I don't think unbound can enable it automatically yet.
1
2
DANE TLSA isn't being broadly adopted outside of mail servers yet but it has momentum going now. SSHFP records are also really nice and available today. I always set up ed25519 sha256 SSHFP record for each server with zeroed ones for names that aren't meant to be used with SSH.
1
1
systemd has these features via systemd-resolved. I always replace it with unbound on systemd distributions but their implementation isn't that bad anymore. It would be nice if non-systemd distributions kept up and started providing DNSSEC and the other advantages of this too.
1
1
systemd still defaults to DNSSEC=allow-downgrade because it's broken for a lot of clients. It's rarely ever broken on servers though. I think for Alpine, it wouldn't be particularly disruptive to deploy enforcing DNSSEC by default. Really not that bad for clients overall anyway.
1
1
I think users on Alpine, Arch, etc. can be expected to figure out if they have a network breaking DNSSEC and either fix the network or use DoT to bypass it. Harder to get deployed for distributions aimed at less technical people because DNSSEC is broken for ~1% or so of clients.
1
1