mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.1K
active users

#domains

4 posts3 participants0 posts today

Silly question

the TLD .games - is that "all about games" or primarily game devs/projects.

I am a gamer/twitch streamer/game reviewer/steam curator (I love games) and looking to create my own pocket of the universe (web domain).

the 2 TLD domains for gaming are .game and .games so thinking (name).games since I am not surrounding a single game like a dev or studio might

if not I will go .ca or something :)

Update: domain unsuspended!

Porkbun took a dim view of the outcome apparently; overnight they went into bat for me while I slept and have now sorted it with XYZ! I have updated them with the responses from Spamhaus and are going to follow up on that as well. Honestly I am super impressed with Porkbun after this. Faith in (some of) humanity restored. Especially their staff member Steve.


TLDR: Be wary using XYZ owned domains

What a fucking debacle. I purchased a cheap .quest domain to run my xmpp server on for my family and a few close friends. It was on sale, was cheap and I grabbed it.
It lasted less than 24 hours before being suspended by the regsistrar.

Turns out, it ended up on a spamhaus list, and XYZ suspends domains automatically based on that. I have lodged tickets with each, but can't rectify because:
- Spamhaus issues can't be rectified because the domain is locked
- XYZ won't unsuspend because it is still on the Spamhaus blocklist

Chicken and egg. I have tickets with each, and with Porkbun which is where I started.
I get it. It's a fucking great scam to bleed money from spammers when they snap up cheap domains.

I just wanted one to self-host xmpp for my family though, and am now caught up in the loop sadly.

It is extremely unlikely I will purchase any other XYZ owned domains (there are a lot, and some fun ones sadly).

Spamhaus in itself isn't necessarily a bad thing; it is a great tool. But automatically flagging everything listed by it in your registrar? Yeah nah fuck that. XYZ using external blocklists where everything is automatically opted in with no practical recourse is a terrible idea. The same goes for domains, fedi, whatever. There is always collateral damage and it sours it for everyone. It is just a stupid.

#spamhaus #domains #domain #DNS #XYZ #spam #blocklist #porkbun

I discovered a new scam today through one of my clients. Some of you may already know about it but even if this info helps 1 person it's worth it.

So heres how it happened.

I'm hosting a number of clients, so I go in and check their domains on a regular basis. I find one domain that is expiring soon, (Registered elsewhere) so I contact the client.

1/3

Decision was made. I’ll move my #homelab domains from #Cloudflare to #Infomaniak. One by one upon reaching each renewal deadline. #Cloudflare is a little bit cheaper, but has a lot of stuff I’m not using and/or don’t want. #Infomaniak gives limited free email service with each domain and is #european. Also #infomaniak feels more like a good old web hosting with a modern UI, good documentation and additional perks. I like it so far.
The only #Cloudflare thing I’ll miss is an almost instant DNS records update considering how many ISPs and services rely on 1.1.1.1.
#domains #hosting #eualternatives

This week, we encountered a new phishing campaign utilizing the Tycoon 2FA Phishing-as-a-Service (PhaaS) to bypass multifactor authentication (MFA).

The RDGA domains have Russian TLDs but are hosted on CloudFlare infrastructure. We have been seeing them use shared infrastructure for a few months now, definitely trying to make detection more challenging. They continue to obfuscate every piece of code but have updated their verification page. Previously, we always saw their custom Cloudflare Turnstile page, but now they also use a new captcha challenge, as shown below.(You can also check it here urlscan.io/result/0195ed8b-7a4 )

Their old Cloudflare Turnstile page seems to still be their favorite, even though they now change their message more frequently: "Checking response before request" or "Tracking security across platform" are some of the new messages they use.

Here is a sample of the hundreds of domains we are detecting:
womivor[.]ru
nthecatepi[.]ru
toimlqdo[.]ru
dantherevin[.]ru
xptdieemy[.]ru

#dns#domains#phishing

(1/2)
cnregistry.net sent us an email telling us that company ░░░░░░ Ltd. wanted to register domain names, and asked us if the company was a business partner of ours in China. We politely said No.

Today we receive an email from ░░░░░░ Ltd. (see below)

Doesn't sound like they leave us with many options.