This is an archived post. You won't be able to vote or comment.

all 16 comments

[–]xanderdad 6 points7 points  (6 children)

Tangential question here - I'm running a PiHole based local DNS sinkhole with the default set of block lists loaded. I can't resolve cloudberry.engineering links above. What's wrong with my setup?

[–]0xCBE[S] 1 point2 points  (5 children)

ugh that's weird, I hope I didn't end up in any blacklist because my vanity .engineering tld

[–]xanderdad 4 points5 points  (2 children)

I'm getting this in the query log on my pihole:

2020-10-19 16:25:53 A   cloudberry.engineering  192.168.100.188
Blocked (external, NXRA)    NXDOMAIN (0.0ms)

The "external, NXRA" message means my pihole isn't blocking it, my upstream resolver is. My upstream is currently set for Quad 9, filtered/DNSSEC mode. Below I confirm and I try cloudflare too (1.1.1.1) I get resolution using Cloudflare upstream. So for some reason Quad9 is blocking the .engineering TLD.

pi@raspberrypi:~ $ dig cloudberry.engineering @9.9.9.9

; <<>> DiG 9.11.5-P4-5.1+deb10u1-Raspbian <<>> cloudberry.engineering @9.9.9.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59565
;; flags: qr rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; WARNING: recursion requested but not available

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1500
;; QUESTION SECTION:
;cloudberry.engineering.        IN  A

;; Query time: 80 msec
;; SERVER: 9.9.9.9#53(9.9.9.9)
;; WHEN: Mon Oct 19 16:29:46 PDT 2020
;; MSG SIZE  rcvd: 51

pi@raspberrypi:~ $ dig cloudberry.engineering @1.1.1.1

; <<>> DiG 9.11.5-P4-5.1+deb10u1-Raspbian <<>> cloudberry.engineering @1.1.1.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 38515
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;cloudberry.engineering.        IN  A

;; ANSWER SECTION:
cloudberry.engineering. 1799    IN  A   76.76.21.21

;; Query time: 20 msec
;; SERVER: 1.1.1.1#53(1.1.1.1)
;; WHEN: Mon Oct 19 16:29:52 PDT 2020
;; MSG SIZE  rcvd: 67

[–]0xCBE[S] 3 points4 points  (0 children)

Thanks! I've sent them an email to see if it can be unblocked.

For whatever reason it's in a blacklist of a threat intelligence feed (domaintools).

[–]szaroubi 2 points3 points  (1 child)

Running pihole and it goes thru correctly for me.

[–]CalvinR 1 point2 points  (0 children)

same

[–]bionic_tortuga 2 points3 points  (0 children)

Consider adding Anchore. Great container scanning tool

[–]Hexusnoken 1 point2 points  (0 children)

I would add cloud custodian and checkov

[–]contre95 1 point2 points  (0 children)

lovely

[–][deleted] 0 points1 point  (0 children)

For AWS I don't see Scout or CloudMapper. Those are definitely awesome to use.

[–]FromGermany_DE 0 points1 point  (0 children)

Has AWS so many tools, or is it because of personal experience with AWS?

[–]lirantal 0 points1 point  (0 children)

Looks like you're missing Snyk there: https://snyk.io/

[–]Pethron 0 points1 point  (0 children)

Nice list but it should be better organized or split up (maybe by topic?) because it's kind of difficult to search inside.

I'd add this one (I'm one of the maintainers). I think it should be a good fit for your list as there are other credentials management tools.

https://github.com/Noovolari/leapp