Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 22545, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2019, 00:00:00 +, Signature-Inception: 20.11.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: me
|
|
me
| 2 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner me., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 12.12.2019, 17:00:00 +, Signature-Inception: 29.11.2019, 16:00:00 +, KeyTag 22545, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 2569, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 32813, Flags 256
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 37367, Flags 256
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 53233, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 3 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner me., Algorithm: 7, 1 Labels, original TTL: 900 sec, Signature-expiration: 17.12.2019, 21:48:38 +, Signature-Inception: 26.11.2019, 20:48:38 +, KeyTag 2569, Signer-Name: me
|
|
|
|
|
| RRSIG-Owner me., Algorithm: 7, 1 Labels, original TTL: 900 sec, Signature-expiration: 17.12.2019, 21:48:38 +, Signature-Inception: 26.11.2019, 20:48:38 +, KeyTag 32813, Signer-Name: me
|
|
|
|
|
| RRSIG-Owner me., Algorithm: 7, 1 Labels, original TTL: 900 sec, Signature-expiration: 17.12.2019, 21:48:38 +, Signature-Inception: 26.11.2019, 20:48:38 +, KeyTag 53233, Signer-Name: me
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 2569 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 32813 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 53233 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 2569, DigestType 1 and Digest "CboetNIEAmIIgf2YSJlEF4ANsmo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 2569, DigestType 2 and Digest "lOeYEG8DNQDmdWexl66RMsDpFnZNx0PFWp7KPHv1WeI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: robles.me
|
|
robles.me
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner robles.me., Algorithm: 7, 2 Labels, original TTL: 86400 sec, Signature-expiration: 17.12.2019, 21:48:38 +, Signature-Inception: 26.11.2019, 20:48:38 +, KeyTag 32813, Signer-Name: me
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 32813 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 36476, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner robles.me., Algorithm: 13, 2 Labels, original TTL: 3601 sec, Signature-expiration: 12.12.2019, 00:00:00 +, Signature-Inception: 21.11.2019, 00:00:00 +, KeyTag 36476, Signer-Name: robles.me
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 36476 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 36476, DigestType 1 and Digest "PHHobu5zNgZXmtDV1bUe/S+ZNQ8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: controller.robles.me
|
|
controller.robles.me
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "controller.robles.me" and the NextOwner "host-9skx.lab.robles.me". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 157.230.139.88
Validated: RRSIG-Owner controller.robles.me., Algorithm: 13, 3 Labels, original TTL: 1799 sec, Signature-expiration: 12.12.2019, 00:00:00 +, Signature-Inception: 21.11.2019, 00:00:00 +, KeyTag 36476, Signer-Name: robles.me
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issueletsencrypt.org
Validated: RRSIG-Owner controller.robles.me., Algorithm: 13, 3 Labels, original TTL: 1799 sec, Signature-expiration: 12.12.2019, 00:00:00 +, Signature-Inception: 21.11.2019, 00:00:00 +, KeyTag 36476, Signer-Name: robles.me
|
|
|
|
|
| RRSIG Type 47, expiration 2019-12-12 00:00:00 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner controller.robles.me, NextOwner: host-9skx.lab.robles.me.
Bitmap: A, RRSIG, NSEC, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-12-12 00:00:00 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner controller.robles.me, NextOwner: host-9skx.lab.robles.me.
Bitmap: A, RRSIG, NSEC, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-12-12 00:00:00 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner controller.robles.me, NextOwner: host-9skx.lab.robles.me.
Bitmap: A, RRSIG, NSEC, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-12-12 00:00:00 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner controller.robles.me, NextOwner: host-9skx.lab.robles.me.
Bitmap: A, RRSIG, NSEC, CAA
|
|
|
Zone: www.controller.robles.me
|
|
www.controller.robles.me
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "controller.robles.me" and the NextOwner "host-9skx.lab.robles.me". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC, CAA
|