

{"id":129,"date":"2011-02-14T14:46:25","date_gmt":"2011-02-14T19:46:25","guid":{"rendered":"http:\/\/rud.is\/b\/?p=129"},"modified":"2011-02-14T14:46:26","modified_gmt":"2011-02-14T19:46:26","slug":"metricon-name-server-log-data","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/","title":{"rendered":"Metricon: Name Server Log Data"},"content":{"rendered":"<p>Speakers: Fruhwirth, Proschinger, Lendl, Savola<\/p>\n<p>&#8220;On the use of name server log data as input for security measurements&#8221;<\/p>\n<p>\u00a0<\/p>\n<p><strong>CERT.at ERT<\/strong><\/p>\n<ul>\n<li>coordinate sec efforts &amp; inc resp for IT sec prblms on a national level in Austria<\/li>\n<li>constituted of IT company security teams and local CERTs<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>Why name server data?<\/strong><\/p>\n<ul>\n<li>CERT.at is mandated to inform and facilitate comm.<\/li>\n<li>DNS data is a rich data source, easily obtainable<\/li>\n<li>DNS logs usefulness increased if you can get them from the largest number of users<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>DNS 101<\/strong><\/p>\n<ul>\n<li>gTLDs &amp; ccTLDs<\/li>\n<li>ccTLDs have local policies<\/li>\n<li>Passive collection will enable determination of IP addr changes, NS changes &amp; domains\/IP but impracticable to have sensors everywhere<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><strong>DNS Reporting View<\/strong><\/p>\n<p>DNS view is a matrix for stakeholders and security chain\/measurements<\/p>\n<p>Vuln\u00a0CERT | Large Co | SME | User<\/p>\n<p>Exp<br \/>Threat<br \/>Risk<br \/>Countermasure<br \/>Incident<\/p>\n<p>third dimension &#8211; field of view &#8211; DNS hierarchy changes view picture<\/p>\n<p>\u00a0<\/p>\n<p>4 example use cases CERT.at worked on:<\/p>\n<p><strong>Aurora<\/strong><\/p>\n<ul>\n<li>CnC server was based on dynamic DNS<\/li>\n<\/ul>\n<p>\/me: their matrix analysis makes it easy to see where DNS logs provided insigne to signs of vuln, severity of threat per stakeholder, whether it was something an org could have identified on their own (data source)<\/p>\n<p>\u00a0<\/p>\n<p><strong>Conficker<\/strong><\/p>\n<p>Pseudorandom domains B-250 regs\/day, C-450 .at domains\/day<\/p>\n<p>Aconet CERT runs nameservers and a sinkhole<\/p>\n<p>CERT.at uses the DNS data to generate warnings<\/p>\n<p>\/me: the table view shows that you can both detect with DNS and deploy countermeasures with DNS (and what org can do what)<\/p>\n<p>\u00a0<\/p>\n<p><strong>Kaminsky DNS Bug<\/strong><\/p>\n<p>CERT.at used logs to score resolvers<\/p>\n<p>score = port changes\/queries &amp; ports\/min \u00a0(higher score == better)<\/p>\n<p>they were able to see how quickly servers were patched (very interesting view)<\/p>\n<p>\/me: the chart is a bit hard to read but it shows the difficulty of not having a larger view of DNS to help detect subtle issues like this one<\/p>\n<p>\u00a0<\/p>\n<p><strong>Stuxnet<\/strong><\/p>\n<p>CnC attempts visible in DNS logs<\/p>\n<p>\/me: the chart shows that if you knew the domains, you could have detected in your own network<\/p>\n<p>\u00a0<\/p>\n<p>There are blind points: lack of visibility in top-down view; DNS can&#8217;t really show severity<\/p>\n<p>info exchange on signs of exploited vulns; focus on info exchange of incidents<\/p>\n<p>[side-talk: how do we incent folks to share data&#8230; &#8220;ask nicely!&#8221;&#8230;]<\/p>\n<p>[side-talk: what % did not know who CERT.at was? 80% of crit infra knew; highly dependent on sector; CERT.at deliberately hired across sectors to help promote \/me: good q]<\/p>\n<p>[side-talk: good discussion on CERT practices; how they detect and then how they engage constituents]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speakers: Fruhwirth, Proschinger, Lendl, Savola &#8220;On the use of name server log data as input for security measurements&#8221; \u00a0 CERT.at ERT coordinate sec efforts &amp; inc resp for IT sec prblms on a national level in Austria constituted of IT company security teams and local CERTs \u00a0 Why name server data? CERT.at is mandated to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3,47,4],"tags":[219,217,743,222,220,218,221],"class_list":["post-129","post","type-post","status-publish","format-standard","hentry","category-information-security","category-metrics","category-risk","tag-aurora","tag-conficker","tag-dns","tag-domain-name-system","tag-internet-protocols","tag-large-co","tag-partition-coefficient"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Metricon: Name Server Log Data - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metricon: Name Server Log Data - rud.is\" \/>\n<meta property=\"og:description\" content=\"Speakers: Fruhwirth, Proschinger, Lendl, Savola &#8220;On the use of name server log data as input for security measurements&#8221; \u00a0 CERT.at ERT coordinate sec efforts &amp; inc resp for IT sec prblms on a national level in Austria constituted of IT company security teams and local CERTs \u00a0 Why name server data? CERT.at is mandated to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-14T19:46:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-02-14T19:46:26+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Metricon: Name Server Log Data\",\"datePublished\":\"2011-02-14T19:46:25+00:00\",\"dateModified\":\"2011-02-14T19:46:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\"},\"wordCount\":422,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"Aurora\",\"Conficker\",\"DNS\",\"Domain name system\",\"Internet protocols\",\"Large Co\",\"Partition coefficient\"],\"articleSection\":[\"Information Security\",\"Metrics\",\"Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\",\"url\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\",\"name\":\"Metricon: Name Server Log Data - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"datePublished\":\"2011-02-14T19:46:25+00:00\",\"dateModified\":\"2011-02-14T19:46:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Metricon: Name Server Log Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Metricon: Name Server Log Data - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/","og_locale":"en_US","og_type":"article","og_title":"Metricon: Name Server Log Data - rud.is","og_description":"Speakers: Fruhwirth, Proschinger, Lendl, Savola &#8220;On the use of name server log data as input for security measurements&#8221; \u00a0 CERT.at ERT coordinate sec efforts &amp; inc resp for IT sec prblms on a national level in Austria constituted of IT company security teams and local CERTs \u00a0 Why name server data? CERT.at is mandated to [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/","og_site_name":"rud.is","article_published_time":"2011-02-14T19:46:25+00:00","article_modified_time":"2011-02-14T19:46:26+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Metricon: Name Server Log Data","datePublished":"2011-02-14T19:46:25+00:00","dateModified":"2011-02-14T19:46:26+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/"},"wordCount":422,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["Aurora","Conficker","DNS","Domain name system","Internet protocols","Large Co","Partition coefficient"],"articleSection":["Information Security","Metrics","Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/","url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/","name":"Metricon: Name Server Log Data - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-02-14T19:46:25+00:00","dateModified":"2011-02-14T19:46:26+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-name-server-log-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Metricon: Name Server Log Data"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-25","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":4267,"url":"https:\/\/rud.is\/b\/2016\/04\/11\/clandestine-dns-lookups-with-gdns\/","url_meta":{"origin":129,"position":0},"title":"Clandestine DNS lookups with gdns","author":"hrbrmstr","date":"2016-04-11","format":false,"excerpt":"Google recently [announced](https:\/\/developers.google.com\/speed\/public-dns\/docs\/dns-over-https) their DNS-over-HTTPS API, which _\"enhances privacy and security between a client and a recursive resolver, and complements DNSSEC to provide end-to-end authenticated DNS lookups\"_. The REST API they provided was pretty simple to [wrap into a package](https:\/\/github.com\/hrbrmstr\/gdns) and I tossed in some [SPF](http:\/\/www.openspf.org\/SPF_Record_Syntax) functions that I had\u2026","rel":"","context":"In &quot;APIs&quot;","block_context":{"text":"APIs","link":"https:\/\/rud.is\/b\/category\/apis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/04\/Fullscreen_4_11_16__1_10_AM.png?fit=1173%2C1013&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/04\/Fullscreen_4_11_16__1_10_AM.png?fit=1173%2C1013&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/04\/Fullscreen_4_11_16__1_10_AM.png?fit=1173%2C1013&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/04\/Fullscreen_4_11_16__1_10_AM.png?fit=1173%2C1013&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/04\/Fullscreen_4_11_16__1_10_AM.png?fit=1173%2C1013&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":9386,"url":"https:\/\/rud.is\/b\/2018\/04\/01\/more-options-for-querying-dns-from-r-with-1-1-1-1\/","url_meta":{"origin":129,"position":1},"title":"More Options For Querying DNS From R with 1.1.1.1","author":"hrbrmstr","date":"2018-04-01","format":false,"excerpt":"You have to have been living under a rock to not know about Cloudflare's new 1.1.1.1 DNS offering. I won't go into \"privacy\", \"security\" or \"speed\" concepts in this post since that's a pretty huge topic to distill for folks given the, now, plethora of confusing (and pretty technical) options\u2026","rel":"","context":"In &quot;DNS&quot;","block_context":{"text":"DNS","link":"https:\/\/rud.is\/b\/category\/dns\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13717,"url":"https:\/\/rud.is\/b\/2023\/02\/27\/bizarre-dns-hacks-for-fun-and-um-fun\/","url_meta":{"origin":129,"position":2},"title":"&#8220;Bizarre&#8221; DNS Hacks For Fun And,  Um\u2026, Fun","author":"hrbrmstr","date":"2023-02-27","format":false,"excerpt":"I've been (slowly) making my way through FOSDEM `23 presentations and caught up to Peter Lowe's \"Bizarre and Unusual Uses of DNS \u2022 Rule 53: If you can think of it, someone's done it in the DNS\" talk. DNS oddities are items I collect whenever I see them, and while\u2026","rel":"","context":"In &quot;DNS&quot;","block_context":{"text":"DNS","link":"https:\/\/rud.is\/b\/category\/dns\/"},"img":{"alt_text":"silhouette of a couple with \"It\u2026It was DNS\" over them","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/02\/2069959_1.jpg?fit=630%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/02\/2069959_1.jpg?fit=630%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/02\/2069959_1.jpg?fit=630%2C630&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":12225,"url":"https:\/\/rud.is\/b\/2019\/05\/26\/two-new-ways-to-make-dns-over-https-queries-in-r\/","url_meta":{"origin":129,"position":3},"title":"Two New Ways to Make DNS over HTTPS Queries in R","author":"hrbrmstr","date":"2019-05-26","format":false,"excerpt":"A fair bit of time ago the {gdns} package made its way to CRAN to give R users the ability to use Google's (at that time) nascent support for DNS over HTTPS (DoH). A bit later on Cloudflare also provided a global DoH endpoint and that begat the (not-on-CRAN) {dnsflare}\u2026","rel":"","context":"In &quot;DNS&quot;","block_context":{"text":"DNS","link":"https:\/\/rud.is\/b\/category\/dns\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2969,"url":"https:\/\/rud.is\/b\/2014\/04\/25\/moving-from-system-calls-to-rcpp-interfaces\/","url_meta":{"origin":129,"position":4},"title":"Moving From system() calls to Rcpp Interfaces","author":"hrbrmstr","date":"2014-04-25","format":false,"excerpt":"Over on the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Apr\/making-better-dns-txt-record-lookups-with-rcpp\/) there's a post on how to use `Rcpp` to interface with an external library (in this case `ldns` for DNS lookups). It builds on [another post](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Apr\/firewall-busting-asn-lookups\/) which uses `system()` to make a call to `dig` to lookup DNS `TXT` records. The core code\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9392,"url":"https:\/\/rud.is\/b\/2018\/04\/02\/nykolas-z-updates-global-alternative-dns-speed-test-to-include-cloudflare-1-1-1-1\/","url_meta":{"origin":129,"position":5},"title":"Nykolas Z Updates Global Alternative DNS Speed Test to Include Cloudflare (1.1.1.1)","author":"hrbrmstr","date":"2018-04-02","format":false,"excerpt":"A while back, Medium blogger 'Nykolas Z' posted results from a globally distributed DNS resolver test to find the speediest provider (NOTE: speed is not the only consideration when choosing an alternative DNS provider). While the test methodology is not provided (the \"scientific method\" has yet to fully penetrate \"cyber\")\u2026","rel":"","context":"In &quot;DNS&quot;","block_context":{"text":"DNS","link":"https:\/\/rud.is\/b\/category\/dns\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2018\/04\/cf-speed.png?fit=1200%2C663&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/129\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}