Conversation
Notices
-
Erkan Yılmaz (erkan@fediverse.com)'s status on Saturday, 31-Jan-2015 01:12:03 UTC Erkan Yılmaz let me see... -
Erkan Yılmaz (erkan@fediverse.com)'s status on Friday, 30-Jan-2015 16:55:38 UTC Erkan Yılmaz Can all !gs admins please post their SSL SHA1 Fingerprint (1) from their normal accounts ? I'll add it to (2). Please don't edit the wiki anonymously with it. THX. cc !gnusocial !SNadmins (1) can be done via: "openssl x509 -in sub.class1.server.ca.pem -fingerprint -noout" (2) http://skilledtests.com/wiki/List_of_Independent_GNU_social_Instances -
MMN-o ✅⃠ (mmn@social.umeahackerspace.se)'s status on Friday, 30-Jan-2015 17:00:46 UTC MMN-o ✅⃠ @erkan remind me about it on Sunday .P -
Erkan Yılmaz (erkan@fediverse.com)'s status on Friday, 30-Jan-2015 17:13:33 UTC Erkan Yılmaz thx, both done -
Erkan Yılmaz (erkan@fediverse.com)'s status on Friday, 30-Jan-2015 17:17:10 UTC Erkan Yılmaz merci -
Erkan Yılmaz (erkan@fediverse.com)'s status on Friday, 30-Jan-2015 18:08:21 UTC Erkan Yılmaz thanks -
ka’imi (kaimi@status.kaimi.cc)'s status on Friday, 30-Jan-2015 23:03:20 UTC ka’imi 99:C1:B6:02:37:69:21:40:1B:30:F9:CE:1D:68:B3:3F:55:79:65:7A Erkan Yılmaz repeated this. -
Erkan Yılmaz (erkan@fediverse.com)'s status on Friday, 30-Jan-2015 23:08:58 UTC Erkan Yılmaz thx. done. and from now on I'll just "like" a fingerprint post to not disturb others -
Erkan Yılmaz (erkan@fediverse.com)'s status on Friday, 30-Jan-2015 23:34:21 UTC Erkan Yılmaz no need, his fingerprint is now listed at http://www.skilledtests.com/wiki/List_of_Independent_GNU_social_Instances -
Erkan Yılmaz (erkan@fediverse.com)'s status on Saturday, 31-Jan-2015 00:11:17 UTC Erkan Yılmaz ok, will repeat now -
Erkan Yılmaz (erkan@fediverse.com)'s status on Saturday, 31-Jan-2015 00:50:30 UTC Erkan Yılmaz feel free to post a howto, so admins can follow this info then -
Erkan Yılmaz (erkan@fediverse.com)'s status on Saturday, 31-Jan-2015 01:15:53 UTC Erkan Yılmaz " #DNSSEC works by digitally signing records for DNS lookup using public-key cryptography. The correct DNSKEY record is authenticated via a chain of trust, starting with a set of verified public keys for the DNS root zone which is the trusted third party. Domain owners generate their own keys, and upload them using their DNS control panel at their domain-name registrar, which in turn pushes the keys via secDNS to the zone operator (e.g.: Verisign for .com) who signs and publishes them in DNS." https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions#How_it_works cc @question
-