Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 42351, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2021, 00:00:00 +, Signature-Inception: 20.02.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 05.03.2021, 05:00:00 +, Signature-Inception: 20.02.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 27558, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34266, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 10.03.2021, 15:29:59 +, Signature-Inception: 17.02.2021, 14:29:59 +, KeyTag 26974, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: pjin.org
|
|
pjin.org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest kipE08/vgEAGIqOfHosYt+jJJrqY62gw0kzTLRECuys=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner pjin.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 10.03.2021, 15:29:59 +, Signature-Inception: 17.02.2021, 14:29:59 +, KeyTag 34266, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner pjin.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.03.2021, 00:04:49 +, Signature-Inception: 16.01.2021, 00:04:49 +, KeyTag 2371, Signer-Name: pjin.org
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "kipE08/vgEAGIqOfHosYt+jJJrqY62gw0kzTLRECuys=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: apps.pjin.org
|
|
apps.pjin.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: vm6-superhost.srv.peterjin.org
Validated: RRSIG-Owner apps.pjin.org., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 21.02.2021, 19:56:57 +, Signature-Inception: 19.02.2021, 17:56:57 +, KeyTag 34505, Signer-Name: pjin.org
|
|
|
Zone: www.apps.pjin.org
|
|
www.apps.pjin.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: vm6-superhost.srv.peterjin.org
Validated: RRSIG-Owner www.apps.pjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 21.02.2021, 19:56:57 +, Signature-Inception: 19.02.2021, 17:56:57 +, KeyTag 34505, Signer-Name: pjin.org
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 42351, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2021, 00:00:00 +, Signature-Inception: 20.02.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 05.03.2021, 05:00:00 +, Signature-Inception: 20.02.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 27558, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34266, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 10.03.2021, 15:29:59 +, Signature-Inception: 17.02.2021, 14:29:59 +, KeyTag 26974, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: peterjin.org
|
|
peterjin.org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest JIAHV5JAdr7zgSaVkTI4yum3z3Wom19acBm48bDIjTo=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner peterjin.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 10.03.2021, 15:29:59 +, Signature-Inception: 17.02.2021, 14:29:59 +, KeyTag 34266, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner peterjin.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.03.2021, 04:27:40 +, Signature-Inception: 12.01.2021, 04:27:40 +, KeyTag 2371, Signer-Name: peterjin.org
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "JIAHV5JAdr7zgSaVkTI4yum3z3Wom19acBm48bDIjTo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: srv.peterjin.org
|
|
srv.peterjin.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "srv.peterjin.org" and the NextOwner "\000.srv.peterjin.org". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: vm6-superhost.srv.peterjin.org
|
|
vm6-superhost.srv.peterjin.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "vm6-superhost.srv.peterjin.org" and the NextOwner "\000.vm6-superhost.srv.peterjin.org". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 23.161.208.240
Validated: RRSIG-Owner vm6-superhost.srv.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 21.02.2021, 19:57:21 +, Signature-Inception: 19.02.2021, 17:57:21 +, KeyTag 34505, Signer-Name: peterjin.org
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2602:0806:A000:8000:0000:0000:0000:0001
Validated: RRSIG-Owner vm6-superhost.srv.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 21.02.2021, 19:57:21 +, Signature-Inception: 19.02.2021, 17:57:21 +, KeyTag 34505, Signer-Name: peterjin.org
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "vm6-superhost.srv.peterjin.org" equal the NSEC-owner "vm6-superhost.srv.peterjin.org" and the NextOwner "\000.vm6-superhost.srv.peterjin.org". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner vm6-superhost.srv.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 21.02.2021, 19:57:21 +, Signature-Inception: 19.02.2021, 17:57:21 +, KeyTag 34505, Signer-Name: peterjin.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "vm6-superhost.srv.peterjin.org" equal the NSEC-owner "vm6-superhost.srv.peterjin.org" and the NextOwner "\000.vm6-superhost.srv.peterjin.org". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner vm6-superhost.srv.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 21.02.2021, 19:57:21 +, Signature-Inception: 19.02.2021, 17:57:21 +, KeyTag 34505, Signer-Name: peterjin.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.vm6-superhost.srv.peterjin.org) sends a valid NSEC RR as result with the query name "_443._tcp.vm6-superhost.srv.peterjin.org" equal the NSEC-owner "_443._tcp.vm6-superhost.srv.peterjin.org" and the NextOwner "\000._443._tcp.vm6-superhost.srv.peterjin.org". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.vm6-superhost.srv.peterjin.org., Algorithm: 13, 6 Labels, original TTL: 3600 sec, Signature-expiration: 21.02.2021, 19:57:21 +, Signature-Inception: 19.02.2021, 17:57:21 +, KeyTag 34505, Signer-Name: peterjin.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "vm6-superhost.srv.peterjin.org" equal the NSEC-owner "vm6-superhost.srv.peterjin.org" and the NextOwner "\000.vm6-superhost.srv.peterjin.org". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner vm6-superhost.srv.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 21.02.2021, 19:57:21 +, Signature-Inception: 19.02.2021, 17:57:21 +, KeyTag 34505, Signer-Name: peterjin.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|