I've been using DNSSEC to sign my internal DNS zones with FreeIPA for quite some time now and have never had any problems. But suddenly, I noticed ipa-dnskeysyncd.service was continuously failing to start, throwing this traceback: dnssec-keyfromlabel: fatal: failed to get key RSASHA256: not found ipa-dnskeysyncd.service: Main process exited, code=exited, status=1/FAILURE Looking deeper into the logs, I could see that LDAP was happily reporting it was adding key metadata to my zones, but the local token was instantly rejecting it: The public key was not found at: pkcs11:object=... The root cause turned out to be a cryptographic "split-brain" situation. The metadata stored in the LDAP directory was correct, but the actual cryptographic private/public key material stored by the local SoftHSM token was missing. You can verify if your saved keys are actually in the token by pointing pkcs11-tool at the FreeIPA SoftHSM database: [root@ipa03 ~]# export SOFTHSM2_CONF=/e...
For the past week, my ISP has been struggling with connectivity to resources hosted on the Cloudflare network. The issues manifested as: Packet loss High latency Low download speeds (despite upload speeds remaining unaffected) To mitigate this, I set up a split tunnel VPN to route all Cloudflare traffic through a WireGuard connection on my MikroTik router. Here is a quick guide on the setup. First, obtain a WireGuard configuration file from your VPN provider. Ensure this file contains all necessary connection parameters, including the private key, endpoint address, and public key. Below is an example of the typical configuration data you will need: [Interface] PrivateKey = <private-key-data> Address = 10.2.0.2/32 DNS = 10.2.0.1 [Peer] PublicKey = <public-key-data> AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = <vpn_provider_endpoint_address>:<vpn_provider_endpoint_port> PersistentKeepalive = 25 Create the WireGuard interface on the router. ...