-
### Describe the bug
As part of https://github.com/quarkusio/quarkus/issues/29888 (cc: @michalvavrik) a check was added for the address of the proxy which the proxy uses to connect to Quarkus.
Whe…
ahus1 updated
2 weeks ago
-
From https://primal.net/e/note16l86pvcfcqdkrpm7h0re58gn9420js2tszndxqh08xfgvqe2lxpqph82r0
> (1) There seems to be an issue when LND uses self-signed certificates, which is the default behavior. Alb…
-
**Describe the bug**
I have notify some strange behavior if I am hosting tls and quic dns server using the server crate.
Dependent on the client some protocols do not work.
| | tls | quic |…
-
The `trust-dns` org has rebranded and renamed all of their crates to `hickory-dns-xyz`. This makes all the old crates effectively unmaintained from version 0.23 onwards.
Would it be appropriate to …
-
Hi there
My machine is travelling between many networks per day. I use trust_dns for enhanced security but sometimes the networks lack IPv6 or IPv4 connections.
Most of my target hosts are dual-st…
-
Trust-DNS currently has only experimental support for mDNS and DNS-SD that has not been maintained since its introduction. I intend to do most of the implementation work, but wanted to engage with the…
-
This is split out from https://github.com/openid/OpenID4VP/issues/219 :
> For item 3 "what if verifier wants to pass multiple trust models, hoping one is supported by the wallet?"
>
> This is im…
-
This is better to dump current DNS code in favor of [Trust-DNS](https://crates.io/crates/trust-dns-server) server and client parts.
-
See the discussion beginning https://github.com/davidben/merkle-tree-certs/issues/80#issuecomment-2252439958. In looking at rebasing MTCs atop this, we realized that MTCs, since it induces many many i…
-
```
Checking if DNS resolvers are DNSSEC-verifying...
WARNING: It looks like the DNS resolvers configured on your system do not
verify DNSSEC, or aren't trusted (by having loopback IPs or through…