Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 33853, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2020, 00:00:00 +, Signature-Inception: 11.01.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: nl
|
|
nl
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 27.01.2020, 05:00:00 +, Signature-Inception: 14.01.2020, 04:00:00 +, KeyTag 33853, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 33853 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34112, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 63744, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.01.2020, 13:28:43 +, Signature-Inception: 08.01.2020, 07:08:02 +, KeyTag 34112, Signer-Name: nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34112 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34112, DigestType 2 and Digest "PFtfmzVXRVxQdRqb6evpI4yI4Z9fB/kwl2kXtRuVzSI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: acm.nl
|
|
acm.nl
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner acm.nl., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 26.01.2020, 09:03:06 +, Signature-Inception: 12.01.2020, 02:08:02 +, KeyTag 63744, Signer-Name: nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 63744 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 43458, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner acm.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 23.01.2020, 00:00:00 +, Signature-Inception: 02.01.2020, 00:00:00 +, KeyTag 43458, Signer-Name: acm.nl
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 43458 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 43458, DigestType 2 and Digest "w+1GDdADXnjQMeb6QVPHBCAHcR2ef4GAjhZ/G0Vw8Hs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 80.95.173.110
Validated: RRSIG-Owner acm.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 23.01.2020, 00:00:00 +, Signature-Inception: 02.01.2020, 00:00:00 +, KeyTag 43458, Signer-Name: acm.nl
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: DNSSEC ENABLED
v=spf1 a:mail.acm.nl include:spf.acm.nl include:spf.byte.nl include:spf.flowmailer.net -all
Validated: RRSIG-Owner acm.nl., Algorithm: 13, 2 Labels, original TTL: 200 sec, Signature-expiration: 23.01.2020, 00:00:00 +, Signature-Inception: 02.01.2020, 00:00:00 +, KeyTag 43458, Signer-Name: acm.nl
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2001:4C10:0005:0623:0000:0000:0000:0110
Validated: RRSIG-Owner acm.nl., Algorithm: 13, 2 Labels, original TTL: 200 sec, Signature-expiration: 23.01.2020, 00:00:00 +, Signature-Inception: 02.01.2020, 00:00:00 +, KeyTag 43458, Signer-Name: acm.nl
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-23 00:00:00 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner acm.nl, NextOwner: fm1._domainkey.acm.nl.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, NSEC, DNSKEY
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-23 00:00:00 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner acm.nl, NextOwner: fm1._domainkey.acm.nl.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, NSEC, DNSKEY
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-23 00:00:00 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner acm.nl, NextOwner: fm1._domainkey.acm.nl.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, NSEC, DNSKEY
|
|
|
Zone: www.acm.nl
|
|
www.acm.nl
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "acm.nl" and the NextOwner "fm1._domainkey.acm.nl". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, NSEC, DNSKEY
|