Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 9799, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2022, 00:00:00 +, Signature-Inception: 11.01.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: one
|
|
one
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 14131, DigestType 1 and Digest jAS0Q+52O4tnzfDbC7yDLiT1YO4=
|
|
|
|
|
| DS with Algorithm 8, KeyTag 14131, DigestType 2 and Digest jRH/gaDpvMJxlpXL5NWFtHqjvebNKMWsbgK9kZypueA=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner one., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.01.2022, 05:00:00 +, Signature-Inception: 13.01.2022, 04:00:00 +, KeyTag 9799, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 9799 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14131, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 29100, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner one., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 09.02.2022, 18:04:22 +, Signature-Inception: 10.01.2022, 17:35:56 +, KeyTag 14131, Signer-Name: one
|
|
|
|
|
| RRSIG-Owner one., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 09.02.2022, 18:04:22 +, Signature-Inception: 10.01.2022, 17:35:56 +, KeyTag 29100, Signer-Name: one
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14131 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 29100 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 14131, DigestType 1 and Digest "jAS0Q+52O4tnzfDbC7yDLiT1YO4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 14131, DigestType 2 and Digest "jRH/gaDpvMJxlpXL5NWFtHqjvebNKMWsbgK9kZypueA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: die.one
|
|
die.one
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest f3zXLpao3P8VX/fPMQ6iJnDDLcRZotxwi9uZL1OrmkM=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner die.one., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.02.2022, 16:14:21 +, Signature-Inception: 10.01.2022, 15:26:05 +, KeyTag 29100, Signer-Name: one
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 29100 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner die.one., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.02.2022, 21:44:26 +, Signature-Inception: 18.12.2021, 21:44:26 +, KeyTag 2371, Signer-Name: die.one
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "f3zXLpao3P8VX/fPMQ6iJnDDLcRZotxwi9uZL1OrmkM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 75.2.60.5
99.83.231.61
Validated: RRSIG-Owner die.one., Algorithm: 13, 2 Labels, original TTL: 185 sec, Signature-expiration: 14.01.2022, 06:45:57 +, Signature-Inception: 12.01.2022, 04:45:57 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:mailbox.org ~all
Validated: RRSIG-Owner die.one., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:57 +, Signature-Inception: 12.01.2022, 04:45:57 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.die.one): _443._tcp.die.one: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
Validated: RRSIG-Owner _443._tcp.die.one., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:58 +, Signature-Inception: 12.01.2022, 04:45:58 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|iodefmailto:hostmaster@die.one
5|issuecomodoca.com
5|issuedigicert.com; cansignhttpexchanges=yes
5|issueletsencrypt.org
9|issuewild;
9|issuewildcomodoca.com
9|issuewilddigicert.com; cansignhttpexchanges=yes
9|issuewildletsencrypt.org
Validated: RRSIG-Owner die.one., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:58 +, Signature-Inception: 12.01.2022, 04:45:58 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "die.one" equal the NSEC-owner "die.one" and the NextOwner "\000.die.one". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner die.one., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:57 +, Signature-Inception: 12.01.2022, 04:45:57 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "die.one" equal the NSEC-owner "die.one" and the NextOwner "\000.die.one". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner die.one., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:57 +, Signature-Inception: 12.01.2022, 04:45:57 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.die.one
|
|
www.die.one
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.die.one" and the NextOwner "\000.www.die.one". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 75.2.60.5
Validated: RRSIG-Owner www.die.one., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.01.2022, 06:45:59 +, Signature-Inception: 12.01.2022, 04:45:59 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 -all
Validated: RRSIG-Owner www.die.one., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:46:00 +, Signature-Inception: 12.01.2022, 04:46:00 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.www.die.one): _443._tcp.www.die.one: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
Validated: RRSIG-Owner _443._tcp.www.die.one., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:46:00 +, Signature-Inception: 12.01.2022, 04:46:00 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.die.one" equal the NSEC-owner "www.die.one" and the NextOwner "\000.www.die.one". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner www.die.one., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:59 +, Signature-Inception: 12.01.2022, 04:45:59 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.die.one" equal the NSEC-owner "www.die.one" and the NextOwner "\000.www.die.one". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner www.die.one., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:45:59 +, Signature-Inception: 12.01.2022, 04:45:59 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.die.one" equal the NSEC-owner "www.die.one" and the NextOwner "\000.www.die.one". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner www.die.one., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 06:46:00 +, Signature-Inception: 12.01.2022, 04:46:00 +, KeyTag 34505, Signer-Name: die.one
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|