Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18733, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.11.2022, 00:00:00 +, Signature-Inception: 31.10.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: xyz
|
|
xyz
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest P6OyZPRdtfOL7erxqIt2qjGMLH8=
|
|
|
|
|
| DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 22.11.2022, 17:00:00 +, Signature-Inception: 09.11.2022, 16:00:00 +, KeyTag 18733, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18733 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3599, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53358, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 01.12.2022, 20:36:46 +, Signature-Inception: 01.11.2022, 10:25:07 +, KeyTag 3599, Signer-Name: xyz
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3599 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest "P6OyZPRdtfOL7erxqIt2qjGMLH8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest "uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: antts.xyz
|
|
antts.xyz
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest unWBP5pl8KuIVUNUH7a6nZxgU+olOztawY9VjbkyYU8=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner antts.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.12.2022, 05:47:15 +, Signature-Inception: 07.11.2022, 19:33:30 +, KeyTag 53358, Signer-Name: xyz
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53358 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner antts.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.12.2022, 02:54:35 +, Signature-Inception: 21.10.2022, 02:54:35 +, KeyTag 2371, Signer-Name: antts.xyz
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "unWBP5pl8KuIVUNUH7a6nZxgU+olOztawY9VjbkyYU8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 81.159.235.103
Validated: RRSIG-Owner antts.xyz., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 10.11.2022, 21:10:48 +, Signature-Inception: 08.11.2022, 19:10:48 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:spf.protection.outlook.com -all
openpgp4fpr:F775C79E812553B6DCED5CC904908EBF49A20542
Validated: RRSIG-Owner antts.xyz., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 10.11.2022, 21:10:48 +, Signature-Inception: 08.11.2022, 19:10:48 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|iodefmailto:admin@antts.xyz
5|issuecomodoca.com
5|issuedigicert.com; cansignhttpexchanges=yes
5|issueglobalsign.com
5|issueletsencrypt.org
5|issuepki.goog; cansignhttpexchanges=yes
9|issuewildcomodoca.com
9|issuewilddigicert.com; cansignhttpexchanges=yes
9|issuewildglobalsign.com
9|issuewildletsencrypt.org
9|issuewildpki.goog; cansignhttpexchanges=yes
Validated: RRSIG-Owner antts.xyz., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 10.11.2022, 21:10:48 +, Signature-Inception: 08.11.2022, 19:10:48 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "antts.xyz" equal the NSEC-owner "antts.xyz" and the NextOwner "\000.antts.xyz". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, URI, CAA Validated: RRSIG-Owner antts.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:48 +, Signature-Inception: 08.11.2022, 19:10:48 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "antts.xyz" equal the NSEC-owner "antts.xyz" and the NextOwner "\000.antts.xyz". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, URI, CAA Validated: RRSIG-Owner antts.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:48 +, Signature-Inception: 08.11.2022, 19:10:48 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.antts.xyz) sends a valid NSEC RR as result with the query name "_443._tcp.antts.xyz" equal the NSEC-owner "_443._tcp.antts.xyz" and the NextOwner "\000._443._tcp.antts.xyz". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner _443._tcp.antts.xyz., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:48 +, Signature-Inception: 08.11.2022, 19:10:48 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.antts.xyz
|
|
www.antts.xyz
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.antts.xyz" and the NextOwner "\000.www.antts.xyz". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: google-site-verification=t9KR38M87cuitYfg-99gDUaHJoFYKs2Bm7L8tF5KNPY
Validated: RRSIG-Owner www.antts.xyz., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.11.2022, 21:10:49 +, Signature-Inception: 08.11.2022, 19:10:49 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the query name "www.antts.xyz" equal the NSEC-owner "www.antts.xyz" and the NextOwner "\000.www.antts.xyz". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner www.antts.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:49 +, Signature-Inception: 08.11.2022, 19:10:49 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.antts.xyz" equal the NSEC-owner "www.antts.xyz" and the NextOwner "\000.www.antts.xyz". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner www.antts.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:49 +, Signature-Inception: 08.11.2022, 19:10:49 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.antts.xyz" equal the NSEC-owner "www.antts.xyz" and the NextOwner "\000.www.antts.xyz". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner www.antts.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:49 +, Signature-Inception: 08.11.2022, 19:10:49 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.antts.xyz) sends a valid NSEC RR as result with the query name "_443._tcp.www.antts.xyz" equal the NSEC-owner "_443._tcp.www.antts.xyz" and the NextOwner "\000._443._tcp.www.antts.xyz". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.www.antts.xyz., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:49 +, Signature-Inception: 08.11.2022, 19:10:49 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.antts.xyz" equal the NSEC-owner "www.antts.xyz" and the NextOwner "\000.www.antts.xyz". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI Validated: RRSIG-Owner www.antts.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 10.11.2022, 21:10:49 +, Signature-Inception: 08.11.2022, 19:10:49 +, KeyTag 34505, Signer-Name: antts.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|