handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

36
active users

#auth

0 posts0 participants0 posts today
Gytis Repečka<p>When you set up authoritative DNS servers for domains, do you try to have <code>NS</code>es in the same TLD zone to take advantage of Glue recors in the zone (e.g.: <code>.net</code> domain would use name servers under <code>.net</code> too), or intentionally use <code>NS</code>es in separate TLD zones (like major cloud vendors do) ignoring Glue records, but using separate TLDs (<code>.com</code>, <code>.info</code>, ccTLD, etc.) for supposed redundancy in case one TLD registry goes offline?</p><p>Or you do not care at all? :blobcatnerd:</p><p><a href="https://social.gyt.is/tags/poll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poll</span></a> <a href="https://social.gyt.is/tags/fediadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediadmin</span></a> <a href="https://social.gyt.is/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://social.gyt.is/tags/dnsserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnsserver</span></a> <a href="https://social.gyt.is/tags/domains" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domains</span></a> <a href="https://social.gyt.is/tags/bind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bind</span></a> <a href="https://social.gyt.is/tags/auth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>auth</span></a> <a href="https://social.gyt.is/tags/tld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tld</span></a> <a href="https://social.gyt.is/tags/cctld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cctld</span></a> <a href="https://social.gyt.is/tags/ns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ns</span></a> <a href="https://social.gyt.is/tags/dnsadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnsadmin</span></a> <a href="https://social.gyt.is/tags/itsalwaysdns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsalwaysdns</span></a></p>
Alvin Ashcraft 🐿️<p>Microsoft Entra External ID Custom URL Domains—now generally available.</p><p><a href="https://buff.ly/4gk3ic9" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">buff.ly/4gk3ic9</span><span class="invisible"></span></a> <br><a href="https://hachyderm.io/tags/identity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identity</span></a> <a href="https://hachyderm.io/tags/entra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>entra</span></a> <a href="https://hachyderm.io/tags/msentra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>msentra</span></a> <a href="https://hachyderm.io/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://hachyderm.io/tags/auth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>auth</span></a> <a href="https://hachyderm.io/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://hachyderm.io/tags/azure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>azure</span></a></p>
Emory<p>dude there's an ssh-tpm-agent! i have been using a u2f yubikey 5nfc with openssh from homebrew* for a private key and it's been pretty seamless, although i think i had to fiddle with synology's or ubiqiti's sshd_conf for appropriate algos iirc, but if you have a TPM available, say, in a rack. uh huh!</p><p>* (it doesn't enable the private key protection patdown - that feature has to be compiled in, so don't worry about your sloppy ass being locked out 😆) </p><p><a href="https://soc.kvet.ch/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://soc.kvet.ch/tags/auth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>auth</span></a> <a href="https://soc.kvet.ch/tags/tpm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tpm</span></a><br><a href="https://chaos.social/@Foxboron/113495083955878182" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chaos.social/@Foxboron/1134950</span><span class="invisible">83955878182</span></a></p>