shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

285
active users

#rfc

0 posts0 participants0 posts today
Kevin Bowen :xfce:<p>A nifty <a href="https://fosstodon.org/tags/CLI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CLI</span></a> tool for reading <a href="https://fosstodon.org/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> documents and drafts:</p><p><a href="https://github.com/bfontaine/rfc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/bfontaine/rfc</span><span class="invisible"></span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://suya.place/users/bogdan" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bogdan</span></a></span> anything that mandates <a href="https://infosec.space/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> and doesn't provide <a href="https://infosec.space/tags/TOTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TOTP</span></a> or <a href="https://infosec.space/tags/HOTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HOTP</span></a> support as per <a href="https://infosec.space/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> but demand something like <a href="https://infosec.space/tags/PhoneNumbers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PhoneNumbers</span></a> that are <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PII</span></a> should be outlawed.</p><ul><li>I can accept <a href="https://infosec.space/tags/PGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PGP</span></a>-based 2FA as a compromise...</li></ul>
mkj<p>Ahh, here it is. Maybe the IETF should publish a list or something including the publication date, so they can be found more easily.</p><p>RFC 9759, Unified Time Scaling for Temporal Coordination Frameworks</p><p><a href="https://datatracker.ietf.org/doc/html/rfc9759" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">rfc9759</span></a></p><p><a href="https://social.mkj.earth/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> <a href="https://social.mkj.earth/tags/RFC9759" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC9759</span></a> <a href="https://social.mkj.earth/tags/TwoWeekPrinciple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TwoWeekPrinciple</span></a></p>
RFC Editor<p>RFC 9726: Operational Considerations for Use of DNS in Internet of Things (IoT) Devices, M. Richardson, et al., <a href="https://www.rfc-editor.org/info/rfc9726" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">rfc-editor.org/info/rfc9726</span><span class="invisible"></span></a> <a href="https://mastodon.online/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> This document details considerations about how Internet of Things (IoT) devices use IP addresses and DNS names. These concerns become acute as network operators begin deploying Manufacturer Usage Descriptions (MUD), as specified in RFC 1/2</p>
Kevin Bowen :xfce:<p>The inspiration for above mentioned re-reading of <a href="https://fosstodon.org/tags/RFC9413" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC9413</span></a> for fun. </p><p>I've always respected Jon Postel's work and, from what I know, took them as inspiration and "guiding principles" in my work as a network engineer and architect. It's good to see, in my opinion, them getting re-evaluated rather than thrown out with the bathwater. YMMV of course.</p><p><a href="https://alexgaynor.net/2025/mar/25/postels-law-and-the-three-ring-circus/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alexgaynor.net/2025/mar/25/pos</span><span class="invisible">tels-law-and-the-three-ring-circus/</span></a></p><p><a href="https://fosstodon.org/tags/standards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standards</span></a> <a href="https://fosstodon.org/tags/protocols" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protocols</span></a> <a href="https://fosstodon.org/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://fosstodon.org/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a></p>
Kevin Bowen :xfce:<p>As good a time as any to re-read an <a href="https://fosstodon.org/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> and re-visit Postel's "law" - "be conservative in what you send, and liberal in what you accept".</p><p>I appreciate the consideration put into this as well as the pertinent examples.</p><p><a href="https://datatracker.ietf.org/doc/html/rfc9413" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">rfc9413</span></a><br><a href="https://fosstodon.org/tags/protocols" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protocols</span></a> <a href="https://fosstodon.org/tags/standards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standards</span></a> <a href="https://fosstodon.org/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p>
RFC Editor<p>RFC 9743: Specifying New Congestion Control Algorithms, M. Duke, Ed., et al., <a href="https://www.rfc-editor.org/info/rfc9743" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">rfc-editor.org/info/rfc9743</span><span class="invisible"></span></a> <a href="https://mastodon.online/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control 1/2</p>
Daniel Supernault<p>Pixelfed Friend Discovery ✨</p><p>Check your contacts to see if they are on Pixelfed, without compromising their privacy, or sharing their info by using the k-Anonymity algo:</p><p>- Your address book/contact list stays on your device<br>- We only send anonymized, partially-hashed data<br>- k-Anonymity ensures no individual can be identified<br>- Discovery service operated by the Pixelfed Foundation, and opt-in per user</p><p>We would love your feedback! </p><p><a href="https://mastodon.social/tags/pixelfed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pixelfed</span></a> <a href="https://mastodon.social/tags/onboarding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onboarding</span></a> <a href="https://mastodon.social/tags/FindYourFriends" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FindYourFriends</span></a> <a href="https://mastodon.social/tags/PrivacyMatters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacyMatters</span></a> <a href="https://mastodon.social/tags/rfc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc</span></a></p>
RFC Editor<p>RFC 9748: Updating the NTP Registries, R. Salz, <a href="https://www.rfc-editor.org/info/rfc9748" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">rfc-editor.org/info/rfc9748</span><span class="invisible"></span></a> <a href="https://mastodon.online/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> The Network Time Protocol (NTP) and Network Time Security (NTS) documents define a number of registries, collectively called the NTP registries.</p>
RFC Editor<p>RFC 9707: Report from the IAB Workshop on Barriers to Internet Access of Services (BIAS), M. Kühlewind, et al., <a href="https://www.rfc-editor.org/info/rfc9707" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">rfc-editor.org/info/rfc9707</span><span class="invisible"></span></a> <a href="https://mastodon.online/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> The "Barriers to Internet Access of Services (BIAS)" workshop was convened by the Internet Architecture Board (IAB) from January 15-17, 2024 as a three-day online meeting. Based on the submitted position papers, the workshop covered 1/2</p>
Gary "grim" Kramlich<p>I just put together a big long post on what if anything <span class="h-card" translate="no"><a href="https://fosstodon.org/@pidgin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pidgin</span></a></span> 3 should do when it comes to original messages after their authors have edited or deleted them.</p><p>We're still a long way away from this, but it's good to thing about these things before we actually get to implement.</p><p>Voting and registration is required via our identity provider which is just meant to fight spam.</p><p>At any rate, let me know what you think!</p><p><a href="https://discourse.imfreedom.org/t/rfc-archiving-of-edited-redacted-and-ephemeral-messages/251" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discourse.imfreedom.org/t/rfc-</span><span class="invisible">archiving-of-edited-redacted-and-ephemeral-messages/251</span></a></p><p><a href="https://mastodon.social/tags/Pidgin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pidgin</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> <a href="https://mastodon.social/tags/Logging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Logging</span></a></p>
Aaron PareckiAt long last, the OAuth working group has finished the Best Current Practice for OAuth 2.0 Security and it was just published as RFC9700! This has been a long time in the works, and I'm very thankful to everyone who has helped out with it over the years! <br> <br><a href="https://www.rfc-editor.org/rfc/rfc9700.html" rel="nofollow noopener noreferrer" target="_blank"><span class="">https://</span>www.rfc-editor.org/rfc/rfc9700.html</a> <br> <br>This is one of the major inputs to OAuth 2.1, so I'm also very excited to be able to move that forward this year as well!
RFC Editor<p>RFC 9704: Establishing Local DNS Authority in Validated Split-Horizon Environments, T. Reddy.K, et al., <a href="https://www.rfc-editor.org/info/rfc9704" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">rfc-editor.org/info/rfc9704</span><span class="invisible"></span></a> <a href="https://mastodon.online/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> When split-horizon DNS is deployed by a network, certain domain names can be resolved authoritatively by a network-provided DNS resolver. DNS clients that are not configured to use this resolver by default can use it for these specific domains 1/2</p>
Stéphane Bortzmeyer<p>RFC 9718: DNSSEC Trust Anchor Publication for the Root Zone</p><p>L'authentification <a href="https://mastodon.gougere.fr/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> repose sur la même structure arborescente que le <a href="https://mastodon.gougere.fr/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> : une zone publie un lien sécurisé vers les clés de ses sous-zones. Un résolveur validant n'a donc besoin que d'une seule clé publique, celle de la racine. Reste donc à configurer la clé de la racine dans le résolveur. Comment est-ce que l'ICANN publie cette clé cruciale ? C'est documenté dans ce <a href="https://mastodon.gougere.fr/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> qui remplace le RFC 7958.</p><p><a href="https://www.bortzmeyer.org/9718.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bortzmeyer.org/9718.html</span><span class="invisible"></span></a></p>
Paul Hoffman<p>And another new RFC I have co-authored: DNSSEC Trust Anchor Publication for the Root Zone<br><a href="https://datatracker.ietf.org/doc/rfc9718/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/rfc97</span><span class="invisible">18/</span></a></p><p><a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://infosec.exchange/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> <a href="https://infosec.exchange/tags/IETF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IETF</span></a> <a href="https://infosec.exchange/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a></p>
h o ʍ l e t t<p>→ RFC 9421: HTTP Message Signatures (par <span class="h-card" translate="no"><a href="https://mastodon.gougere.fr/@bortzmeyer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bortzmeyer</span></a></span>)<br><a href="https://www.bortzmeyer.org/9421.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bortzmeyer.org/9421.html</span><span class="invisible"></span></a></p><p>« Ce RFC spécifie comment on peut signer cryptographiquement et vérifier des messages HTTP, afin de s'assurer de leur authenticité. »</p><p><a href="https://mamot.fr/tags/RFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RFC</span></a> <a href="https://mamot.fr/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a></p>
Gary "grim" Kramlich<p>They say when you use regex you have two problems. I tend to have one less problem...</p><p>Case in point, here's a tokenizer for <a href="https://www.rfc-editor.org/rfc/rfc5801.html#section-4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">rfc-editor.org/rfc/rfc5801.htm</span><span class="invisible">l#section-4</span></a>.</p><p>^(?:(?P&lt;nonstd&gt;F),)?(?P&lt;cb&gt;[npy])(?:=(?P&lt;cbname&gt;[^,]+))?,(?:a=(?P&lt;authzid&gt;[^,]+))?,</p><p>Validation still has to be done in the application, but this is still way easier than writing and maintaining a lexer.</p><p><a href="https://mastodon.social/tags/regex" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>regex</span></a> <a href="https://mastodon.social/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/rfc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc</span></a></p>
uvok<p>This cheetah SHOULD receive regular cuddles, otherwise he MAY get sad. That SHOULD NOT happen, as his performance is degraded otherwise.</p><p><a href="https://furry.engineer/tags/rfc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc</span></a></p>
BoneQuest<p>Today in BoneQuest History for November 15th 2003 "ASS TO BALLS TRANSFER PROTOCOL" <a href="https://bonequest.com/1869" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bonequest.com/1869</span><span class="invisible"></span></a> <a href="https://bonequest.net/tags/bonequest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bonequest</span></a> :deuce: :pants: <a href="https://bonequest.net/tags/ass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ass</span></a> <a href="https://bonequest.net/tags/balls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>balls</span></a> <a href="https://bonequest.net/tags/deuce_pants" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deuce_pants</span></a> <a href="https://bonequest.net/tags/fucking_shut_up" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fucking_shut_up</span></a> <a href="https://bonequest.net/tags/icq" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>icq</span></a> <a href="https://bonequest.net/tags/protocol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protocol</span></a> <a href="https://bonequest.net/tags/rfc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc</span></a></p>
BoneQuest<p>Today in BoneQuest History for November 9th 2006 "HI COCKS PROTOCOL" <a href="https://bonequest.com/2931" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bonequest.com/2931</span><span class="invisible"></span></a> <a href="https://bonequest.net/tags/bonequest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bonequest</span></a> :deuce: :pants: <a href="https://bonequest.net/tags/client_server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>client_server</span></a> <a href="https://bonequest.net/tags/clip_art" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clip_art</span></a> <a href="https://bonequest.net/tags/clipart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clipart</span></a> <a href="https://bonequest.net/tags/deuce_pants" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deuce_pants</span></a> <a href="https://bonequest.net/tags/protocol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protocol</span></a> <a href="https://bonequest.net/tags/rfc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc</span></a> <a href="https://bonequest.net/tags/short_bus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>short_bus</span></a> <a href="https://bonequest.net/tags/title_mismatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>title_mismatch</span></a></p>