Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 22545, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 31.12.2019, 00:00:00 +, Signature-Inception: 10.12.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: marketing
|
|
marketing
| 2 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner marketing., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 29.12.2019, 21:00:00 +, Signature-Inception: 16.12.2019, 20:00:00 +, KeyTag 22545, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 4537, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 32133, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner marketing., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.01.2020, 11:16:14 +, Signature-Inception: 16.12.2019, 11:12:12 +, KeyTag 4537, Signer-Name: marketing
|
|
|
|
|
| RRSIG-Owner marketing., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.01.2020, 11:16:14 +, Signature-Inception: 16.12.2019, 11:12:12 +, KeyTag 32133, Signer-Name: marketing
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 4537 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 32133 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 4537, DigestType 1 and Digest "5t5JZQOsNKd7A/mhawU+ui3q1CE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 4537, DigestType 2 and Digest "zJcwsr6GnP+IzAVKV+RAHq+N9RrP+tWGocCkbSIHFpM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: broken.marketing
|
|
broken.marketing
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "j3ghf4gudfr1l1fpcl4io6n967c4hrjn" between the hashed NSEC3-owner "j379qnhhmglb4uonf0ltom283uambofg" and the hashed NextOwner "j89a5qsu5c22odcnqqe7q6blte5j724s". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner j379qnhhmglb4uonf0ltom283uambofg.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 09.01.2020, 08:34:21 +, Signature-Inception: 10.12.2019, 07:40:51 +, KeyTag 32133, Signer-Name: marketing
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 12720, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34882, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 46036, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 3 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner broken.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.01.2020, 17:32:46 +, Signature-Inception: 12.12.2019, 16:32:46 +, KeyTag 12720, Signer-Name: broken.marketing
|
|
|
|
|
| RRSIG-Owner broken.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.01.2020, 17:32:46 +, Signature-Inception: 12.12.2019, 16:32:46 +, KeyTag 34882, Signer-Name: broken.marketing
|
|
|
|
|
| RRSIG-Owner broken.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.01.2020, 17:32:46 +, Signature-Inception: 12.12.2019, 16:32:46 +, KeyTag 46036, Signer-Name: broken.marketing
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 12720 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34882 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46036 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 12720 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| Error: DNSKEY 34882 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| Error: DNSKEY 46036 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 199.38.245.254
Validated: RRSIG-Owner broken.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.01.2020, 16:43:32 +, Signature-Inception: 12.12.2019, 16:32:46 +, KeyTag 12720, Signer-Name: broken.marketing
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 a mx a:broken.marketing ip4:199.38.245.254 -all
Validated: RRSIG-Owner broken.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.01.2020, 16:43:32 +, Signature-Inception: 12.12.2019, 16:32:46 +, KeyTag 12720, Signer-Name: broken.marketing
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issueletsencrypt.org
Validated: RRSIG-Owner broken.marketing., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.01.2020, 16:43:32 +, Signature-Inception: 12.12.2019, 16:32:46 +, KeyTag 12720, Signer-Name: broken.marketing
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-11 16:43:32 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner broken.marketing, NextOwner: _dmarc.broken.marketing.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-11 16:43:32 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner broken.marketing, NextOwner: _dmarc.broken.marketing.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-11 16:43:32 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner broken.marketing, NextOwner: _dmarc.broken.marketing.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-11 16:55:29 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner default._domainkey.broken.marketing, NextOwner: cdn.broken.marketing.
Bitmap: TXT, RRSIG, NSEC
|
|
|
Zone: www.broken.marketing
|
|
www.broken.marketing
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "broken.marketing" and the NextOwner "_dmarc.broken.marketing". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CAA
|