Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14631, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26838, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.07.2021, 00:00:00 +, Signature-Inception: 20.06.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: br
|
|
br
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2471, DigestType 2 and Digest Xk81mYuPkJVX+hGcTL/cotZgom8GnvAGtAN1igfRouQ=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner br., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 11.07.2021, 21:00:00 +, Signature-Inception: 28.06.2021, 20:00:00 +, KeyTag 14631, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14631 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2471, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 10947, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner br., Algorithm: 13, 1 Labels, original TTL: 21600 sec, Signature-expiration: 18.07.2021, 12:00:00 +, Signature-Inception: 27.06.2021, 12:00:00 +, KeyTag 2471, Signer-Name: br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2471 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2471, DigestType 2 and Digest "Xk81mYuPkJVX+hGcTL/cotZgom8GnvAGtAN1igfRouQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com.br
|
|
com.br
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 4330, DigestType 2 and Digest OYuYh8a/ZcKsjEvGxF752Vx3mFu7Kg++ODhGujDipNU=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com.br., Algorithm: 13, 2 Labels, original TTL: 21600 sec, Signature-expiration: 11.07.2021, 12:05:08 +, Signature-Inception: 27.06.2021, 11:05:08 +, KeyTag 10947, Signer-Name: br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 10947 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 4330, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com.br., Algorithm: 13, 2 Labels, original TTL: 21600 sec, Signature-expiration: 13.07.2021, 03:10:10 +, Signature-Inception: 29.06.2021, 02:10:10 +, KeyTag 4330, Signer-Name: com.br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 4330 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 4330, DigestType 2 and Digest "OYuYh8a/ZcKsjEvGxF752Vx3mFu7Kg++ODhGujDipNU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: appzer.com.br
|
|
appzer.com.br
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 35572, DigestType 2 and Digest iL1wV/R44PxYot/7kJ+o/oV5jRszSXS6om1MmquVOGY=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner appzer.com.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 06.07.2021, 22:10:09 +, Signature-Inception: 22.06.2021, 21:10:09 +, KeyTag 4330, Signer-Name: com.br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 4330 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 35572, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner appzer.com.br., Algorithm: 8, 3 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35572 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 35572, DigestType 2 and Digest "iL1wV/R44PxYot/7kJ+o/oV5jRszSXS6om1MmquVOGY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: cloud.appzer.com.br
|
|
cloud.appzer.com.br
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "o82va1618717mifhodqg5paab858fquo" between the hashed NSEC3-owner "o82va1618717mifhodqg5paab858fquo" and the hashed NextOwner "o82va1618717mifhodqg5paab858fqup". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner o82va1618717mifhodqg5paab858fquo.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 3.23.253.50
Validated: RRSIG-Owner cloud.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 14400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 ip4:162.214.155.27 include:dedi-6269356.appzercloud.com +a +mx +ip4:162.241.98.239 +ip4:3.23.253.50 ~all
Validated: RRSIG-Owner cloud.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 14400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issuecomodoca.com
5|issueletsencrypt.org
Validated: RRSIG-Owner cloud.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 14400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "o82va1618717mifhodqg5paab858fquo" equal the hashed NSEC3-owner "o82va1618717mifhodqg5paab858fquo" and the hashed NextOwner "o82va1618717mifhodqg5paab858fqup". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner o82va1618717mifhodqg5paab858fquo.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "o82va1618717mifhodqg5paab858fquo" equal the hashed NSEC3-owner "o82va1618717mifhodqg5paab858fquo" and the hashed NextOwner "o82va1618717mifhodqg5paab858fqup". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner o82va1618717mifhodqg5paab858fquo.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.cloud.appzer.com.br) sends a valid NSEC3 RR as result with the hashed owner name "uh54tsa922pt0t94f58bi6357cmf30m3" (unhashed: _tcp.cloud.appzer.com.br). So that's the Closest Encloser of the query name.
Bitmap: No Bitmap? Validated: RRSIG-Owner uh54tsa922pt0t94f58bi6357cmf30m3.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "44e4jbotbu5bmkg3ejlmhhk5ekoqgf3i" (unhashed: *._tcp.cloud.appzer.com.br) with the owner "44e4jbotbu5bmkg3ejlmhhk5ekoqgf3h" and the NextOwner "44e4jbotbu5bmkg3ejlmhhk5ekoqgf3j". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: No Bitmap? Validated: RRSIG-Owner 44e4jbotbu5bmkg3ejlmhhk5ekoqgf3h.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.cloud.appzer.com.br) sends a valid NSEC3 RR as result with the hashed query name "7eagce0spm1uf1t0ap3qmojqlqkse16c" between the hashed NSEC3-owner "7eagce0spm1uf1t0ap3qmojqlqkse16b" and the hashed NextOwner "7eagce0spm1uf1t0ap3qmojqlqkse16d". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner 7eagce0spm1uf1t0ap3qmojqlqkse16b.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
Zone: www.cloud.appzer.com.br
|
|
www.cloud.appzer.com.br
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "1pl3piav9ci60u4tcti57q71abbtdd92" between the hashed NSEC3-owner "1pl3piav9ci60u4tcti57q71abbtdd92" and the hashed NextOwner "1pl3piav9ci60u4tcti57q71abbtdd93". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| A-Query sends a valid NSEC3 RR as result with the hashed query name "1pl3piav9ci60u4tcti57q71abbtdd92" equal the hashed NSEC3-owner "1pl3piav9ci60u4tcti57q71abbtdd92" and the hashed NextOwner "1pl3piav9ci60u4tcti57q71abbtdd93". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "1pl3piav9ci60u4tcti57q71abbtdd92" equal the hashed NSEC3-owner "1pl3piav9ci60u4tcti57q71abbtdd92" and the hashed NextOwner "1pl3piav9ci60u4tcti57q71abbtdd93". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "1pl3piav9ci60u4tcti57q71abbtdd92" equal the hashed NSEC3-owner "1pl3piav9ci60u4tcti57q71abbtdd92" and the hashed NextOwner "1pl3piav9ci60u4tcti57q71abbtdd93". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "1pl3piav9ci60u4tcti57q71abbtdd92" equal the hashed NSEC3-owner "1pl3piav9ci60u4tcti57q71abbtdd92" and the hashed NextOwner "1pl3piav9ci60u4tcti57q71abbtdd93". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.cloud.appzer.com.br) sends a valid NSEC3 RR as result with the hashed owner name "1pl3piav9ci60u4tcti57q71abbtdd92" (unhashed: www.cloud.appzer.com.br). So that's the Closest Encloser of the query name.
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "kiischdv33gotff1q2bo4ohe3n1nimp1" (unhashed: _tcp.www.cloud.appzer.com.br) with the owner "kiischdv33gotff1q2bo4ohe3n1nimp0" and the NextOwner "kiischdv33gotff1q2bo4ohe3n1nimp2". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: No Bitmap? Validated: RRSIG-Owner kiischdv33gotff1q2bo4ohe3n1nimp0.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "qvie1guef1ar303adfiuq9mfpnf7g8a2" (unhashed: *.www.cloud.appzer.com.br) with the owner "qvie1guef1ar303adfiuq9mfpnf7g8a1" and the NextOwner "qvie1guef1ar303adfiuq9mfpnf7g8a3". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: No Bitmap? Validated: RRSIG-Owner qvie1guef1ar303adfiuq9mfpnf7g8a1.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "1pl3piav9ci60u4tcti57q71abbtdd92" equal the hashed NSEC3-owner "1pl3piav9ci60u4tcti57q71abbtdd92" and the hashed NextOwner "1pl3piav9ci60u4tcti57q71abbtdd93". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: No Bitmap? Validated: RRSIG-Owner 1pl3piav9ci60u4tcti57q71abbtdd92.appzer.com.br., Algorithm: 8, 4 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 00:00:00 +, Signature-Inception: 17.06.2021, 00:00:00 +, KeyTag 35572, Signer-Name: appzer.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|