Zone (*) DNSSEC - Informations Zone : (root)(root) 1 DS RR published DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
• Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 26838, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 30.09.2021, 00:00:00 +, Signature-Inception: 09.09.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : mmmm 1 DS RR in the parent zone found DS with Algorithm 8, KeyTag 18589, DigestType 2 and Digest CmZAPaLOtMOWB1BzkHTVynmTNLRcheP+3Xg44BokNdg=
1 RRSIG RR to validate DS RR found RRSIG-Owner mm., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.09.2021, 05:00:00 +, Signature-Inception: 13.09.2021, 04:00:00 +, KeyTag 26838, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26838 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 18589, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 32298, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner mm., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 16.09.2021, 02:04:02 +, Signature-Inception: 08.09.2021, 20:45:02 +, KeyTag 18589, Signer-Name: mm
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18589 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 18589, DigestType 2 and Digest "CmZAPaLOtMOWB1BzkHTVynmTNLRcheP+3Xg44BokNdg=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : com.mmcom.mm 1 DS RR in the parent zone found DS with Algorithm 8, KeyTag 22462, DigestType 2 and Digest VV5RdRmEhyI5ieA6LrgueLJ8dKty2PU8u+8fT1JILF8=
1 RRSIG RR to validate DS RR found RRSIG-Owner com.mm., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 18.09.2021, 06:19:42 +, Signature-Inception: 11.09.2021, 08:25:01 +, KeyTag 32298, Signer-Name: mm
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 32298 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 22462, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 65160, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner com.mm., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 18.09.2021, 00:55:57 +, Signature-Inception: 11.09.2021, 09:53:02 +, KeyTag 22462, Signer-Name: com.mm
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22462 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 22462, DigestType 2 and Digest "VV5RdRmEhyI5ieA6LrgueLJ8dKty2PU8u+8fT1JILF8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : mytel.com.mmmytel.com.mm 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "aclmq728ohk86uoe2t5egno8t72eaen3" between the hashed NSEC3-owner "aclmq728ohk86uoe2t5egno8t72eaen3" and the hashed NextOwner "acs2lmd7pphbphca976ghvtu3aq0jv1u". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner aclmq728ohk86uoe2t5egno8t72eaen3.com.mm., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.09.2021, 14:49:16 +, Signature-Inception: 11.09.2021, 04:21:02 +, KeyTag 65160, Signer-Name: com.mm
0 DNSKEY RR found Zone : www.mytel.com.mmwww.mytel.com.mm 0 DS RR in the parent zone found Zone : (root)(root) 1 DS RR published DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
• Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 26838, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 30.09.2021, 00:00:00 +, Signature-Inception: 09.09.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : netnet 1 DS RR in the parent zone found DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=
1 RRSIG RR to validate DS RR found RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.09.2021, 05:00:00 +, Signature-Inception: 13.09.2021, 04:00:00 +, KeyTag 26838, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26838 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 35886, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 65378, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.09.2021, 16:28:30 +, Signature-Inception: 06.09.2021, 16:23:30 +, KeyTag 35886, Signer-Name: net
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35886 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest "eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : cloudflare.netcloudflare.net 1 DS RR in the parent zone found DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest kPcQoQfaUe14El0wpocEzzwDCK/QG/zXBX1L0Dtixos=
1 RRSIG RR to validate DS RR found RRSIG-Owner cloudflare.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 19.09.2021, 05:34:48 +, Signature-Inception: 12.09.2021, 04:24:48 +, KeyTag 65378, Signer-Name: net
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 65378 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 34505, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner cloudflare.net., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 07.10.2021, 03:41:59 +, Signature-Inception: 08.08.2021, 03:41:59 +, KeyTag 2371, Signer-Name: cloudflare.net
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "kPcQoQfaUe14El0wpocEzzwDCK/QG/zXBX1L0Dtixos=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : cdn.cloudflare.netcdn.cloudflare.net 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "cdn.cloudflare.net" and the NextOwner "\000.cdn.cloudflare.net". So the parent zone confirmes the non-existence of a DS RR.Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
0 DNSKEY RR found Zone : mm.cdn.cloudflare.netmm.cdn.cloudflare.net 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "mm.cdn.cloudflare.net" and the NextOwner "\000.mm.cdn.cloudflare.net". So the parent zone confirmes the non-existence of a DS RR.Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
0 DNSKEY RR found Zone : com.mm.cdn.cloudflare.netcom.mm.cdn.cloudflare.net 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "com.mm.cdn.cloudflare.net" and the NextOwner "\000.com.mm.cdn.cloudflare.net". So the parent zone confirmes the non-existence of a DS RR.Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
0 DNSKEY RR found Zone : mytel.com.mm.cdn.cloudflare.netmytel.com.mm.cdn.cloudflare.net 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "mytel.com.mm.cdn.cloudflare.net" and the NextOwner "\000.mytel.com.mm.cdn.cloudflare.net". So the parent zone confirmes the non-existence of a DS RR.Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
0 DNSKEY RR found RRSIG Type 1 validates the A - Result: 104.18.14.152
104.18.15.152 Validated: RRSIG-Owner mytel.com.mm.cdn.cloudflare.net., Algorithm: 13, 6 Labels, original TTL: 300 sec, Signature-expiration: 14.09.2021, 15:50:51 +, Signature-Inception: 12.09.2021, 13:50:51 +, KeyTag 34505, Signer-Name: cloudflare.net
RRSIG Type 28 validates the AAAA - Result: 2606:4700:0000:0000:0000:0000:6812:0E98
2606:4700:0000:0000:0000:0000:6812:0F98 Validated: RRSIG-Owner mytel.com.mm.cdn.cloudflare.net., Algorithm: 13, 6 Labels, original TTL: 300 sec, Signature-expiration: 14.09.2021, 15:50:51 +, Signature-Inception: 12.09.2021, 13:50:51 +, KeyTag 34505, Signer-Name: cloudflare.net
CNAME-Query sends a valid NSEC RR as result with the query name "mytel.com.mm.cdn.cloudflare.net" equal the NSEC-owner "mytel.com.mm.cdn.cloudflare.net" and the NextOwner "\000.mytel.com.mm.cdn.cloudflare.net". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner mytel.com.mm.cdn.cloudflare.net., Algorithm: 13, 6 Labels, original TTL: 3600 sec, Signature-expiration: 14.09.2021, 15:50:51 +, Signature-Inception: 12.09.2021, 13:50:51 +, KeyTag 34505, Signer-Name: cloudflare.net
Status: Good. NoData-Proof required and found. TXT-Query sends a valid NSEC RR as result with the query name "mytel.com.mm.cdn.cloudflare.net" equal the NSEC-owner "mytel.com.mm.cdn.cloudflare.net" and the NextOwner "\000.mytel.com.mm.cdn.cloudflare.net". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner mytel.com.mm.cdn.cloudflare.net., Algorithm: 13, 6 Labels, original TTL: 3600 sec, Signature-expiration: 14.09.2021, 15:50:51 +, Signature-Inception: 12.09.2021, 13:50:51 +, KeyTag 34505, Signer-Name: cloudflare.net
Status: Good. NoData-Proof required and found. TLSA-Query (_443._tcp.mytel.com.mm.cdn.cloudflare.net) sends a valid NSEC RR as result with the query name "_443._tcp.mytel.com.mm.cdn.cloudflare.net" equal the NSEC-owner "_443._tcp.mytel.com.mm.cdn.cloudflare.net" and the NextOwner "\000._443._tcp.mytel.com.mm.cdn.cloudflare.net". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner _443._tcp.mytel.com.mm.cdn.cloudflare.net., Algorithm: 13, 8 Labels, original TTL: 3600 sec, Signature-expiration: 14.09.2021, 15:50:51 +, Signature-Inception: 12.09.2021, 13:50:51 +, KeyTag 34505, Signer-Name: cloudflare.net
Status: Good. NoData-Proof required and found. CAA-Query sends a valid NSEC RR as result with the query name "mytel.com.mm.cdn.cloudflare.net" equal the NSEC-owner "mytel.com.mm.cdn.cloudflare.net" and the NextOwner "\000.mytel.com.mm.cdn.cloudflare.net". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner mytel.com.mm.cdn.cloudflare.net., Algorithm: 13, 6 Labels, original TTL: 3600 sec, Signature-expiration: 14.09.2021, 15:50:52 +, Signature-Inception: 12.09.2021, 13:50:52 +, KeyTag 34505, Signer-Name: cloudflare.net
Status: Good. NoData-Proof required and found.