<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Domain Names on The Coders Blog</title><link>https://thecodersblog.com/tag/domain-names/</link><description>Recent content in Domain Names on The Coders Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 06 May 2026 17:00:05 +0000</lastBuildDate><atom:link href="https://thecodersblog.com/tag/domain-names/index.xml" rel="self" type="application/rss+xml"/><item><title>DNSSEC Outage Disrupts .de Domains, Now Resolved</title><link>https://thecodersblog.com/dnssec-disruption-affecting-de-domains-2026/</link><pubDate>Wed, 06 May 2026 17:00:05 +0000</pubDate><guid>https://thecodersblog.com/dnssec-disruption-affecting-de-domains-2026/</guid><description>&lt;p&gt;Hundreds of thousands of .de domains suddenly became unreachable on May 5, 2026, not due to a massive denial-of-service attack or a widespread network failure, but a single misconfiguration in the Domain Name System Security Extensions (DNSSEC) implementation at DENIC eG, the registry for Germany&amp;rsquo;s country-code top-level domain. For several hours, users relying on validating DNS resolvers encountered frustrating &lt;code&gt;SERVFAIL&lt;/code&gt; errors, effectively rendering a significant portion of the German internet invisible. This incident serves as a stark, albeit temporary, reminder of the inherent complexities and critical fragility underlying our internet&amp;rsquo;s security infrastructure.&lt;/p&gt;</description></item><item><title>.de TLD Offline: DNSSEC Vulnerabilities Expose Infrastructure Weaknesses</title><link>https://thecodersblog.com/de-tld-dnssec-outage-analysis-2026/</link><pubDate>Wed, 06 May 2026 03:34:18 +0000</pubDate><guid>https://thecodersblog.com/de-tld-dnssec-outage-analysis-2026/</guid><description>&lt;p&gt;The internet ground to a halt for legions of &lt;code&gt;.de&lt;/code&gt; domain users around May 5, 2026. Not due to a widespread BGP incident or a distributed denial-of-service attack, but a self-inflicted wound emanating from the heart of Domain Name System Security Extensions (DNSSEC) implementation. A botched key rollover by DENIC, the registry for the &lt;code&gt;.de&lt;/code&gt; top-level domain, effectively severed the chain of trust for millions of users relying on validating DNS resolvers.&lt;/p&gt;</description></item></channel></rss>