Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26470, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.04.2025, 00:00:00 +, Signature-Inception: 12.03.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: io
|
|
io
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.03.2025, 17:00:00 +, Signature-Inception: 17.03.2025, 16:00:00 +, KeyTag 26470, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26470 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34584, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 39585, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 57355, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 07.04.2025, 15:47:23 +, Signature-Inception: 17.03.2025, 14:47:23 +, KeyTag 57355, Signer-Name: io
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 57355 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest "laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: dedyn.io
|
|
dedyn.io
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 35233, DigestType 2 and Digest nGcq4ySIT5oBdDMMp2RPaWAXLB2UAj+Ub3B2Ob5tOrA=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 35233, DigestType 4 and Digest zoB+diKdZKrohrJzI1W91o4snRA5YJCF3+FZM/4DHHGYGn+nf0WyIZL3ZySpsp+5
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner dedyn.io., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 07.04.2025, 15:47:23 +, Signature-Inception: 17.03.2025, 14:47:23 +, KeyTag 34584, Signer-Name: io
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34584 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 35233, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner dedyn.io., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 35233, Signer-Name: dedyn.io
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35233 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 35233, DigestType 2 and Digest "nGcq4ySIT5oBdDMMp2RPaWAXLB2UAj+Ub3B2Ob5tOrA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 35233, DigestType 4 and Digest "zoB+diKdZKrohrJzI1W91o4snRA5YJCF3+FZM/4DHHGYGn+nf0WyIZL3ZySpsp+5" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: dunsel.dedyn.io
|
|
dunsel.dedyn.io
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 11125, DigestType 2 and Digest vp/LKhb6MZKtf5Wr+FPoRsYUPp3jBYgOqGiBbi2mfeY=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 11125, DigestType 4 and Digest OxeA6wH81NpjJbmL/HYRqlLL4vo2WPariajreh/QodaKGNB/jGgqhJhnF9POKlAJ
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner dunsel.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 35233, Signer-Name: dedyn.io
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35233 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 11125, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner dunsel.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 11125 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 11125, DigestType 2 and Digest "vp/LKhb6MZKtf5Wr+FPoRsYUPp3jBYgOqGiBbi2mfeY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 11125, DigestType 4 and Digest "OxeA6wH81NpjJbmL/HYRqlLL4vo2WPariajreh/QodaKGNB/jGgqhJhnF9POKlAJ" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 73.164.216.153
Validated: RRSIG-Owner dunsel.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: Testing TXT Record.
v=spf1 include:_spf.porkbun.com ~all
Validated: RRSIG-Owner dunsel.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issueletsencrypt.org;validationmethods=http-01;accounturi=https://acme-staging-v02.api.letsencrypt.org/acme/acct/188569844
5|issueletsencrypt.org;validationmethods=http-01;accounturi=https://acme-v02.api.letsencrypt.org/acme/acct/2270421646
5|issuesectigo.com
9|issuewild;
Validated: RRSIG-Owner dunsel.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "b08luj3pbrhf4fi12huviuooi4cksalc" equal the hashed NSEC3-owner "b08luj3pbrhf4fi12huviuooi4cksalc" and the hashed NextOwner "fda41n157hnave62sqdk11tcad0m6k0j". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, PTR, TXT, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY, CAA Validated: RRSIG-Owner b08luj3pbrhf4fi12huviuooi4cksalc.dunsel.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "b08luj3pbrhf4fi12huviuooi4cksalc" equal the hashed NSEC3-owner "b08luj3pbrhf4fi12huviuooi4cksalc" and the hashed NextOwner "fda41n157hnave62sqdk11tcad0m6k0j". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, PTR, TXT, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY, CAA Validated: RRSIG-Owner b08luj3pbrhf4fi12huviuooi4cksalc.dunsel.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.dunsel.dedyn.io) sends a valid NSEC3 RR as result with the hashed owner name "b08luj3pbrhf4fi12huviuooi4cksalc" (unhashed: dunsel.dedyn.io). So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "dum6l4nk62uco7fi136hrefgn7vcvdtr" (unhashed: *.dunsel.dedyn.io) with the owner "b08luj3pbrhf4fi12huviuooi4cksalc" and the NextOwner "fda41n157hnave62sqdk11tcad0m6k0j". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: A, NS, SOA, PTR, TXT, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY, CAA Validated: RRSIG-Owner b08luj3pbrhf4fi12huviuooi4cksalc.dunsel.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "1fai3aha8934utv9loaatnj1o0nfvbec" (unhashed: _tcp.dunsel.dedyn.io) with the owner "n6t4s5o5jokthdm52hpoksenkjsimaa7" and the NextOwner "b08luj3pbrhf4fi12huviuooi4cksalc". So that NSEC3 confirms the not-existence of the Next Closer Name. TLSA-Query (_443._tcp.dunsel.dedyn.io) sends a valid NSEC3 RR as result with the owner name "n6t4s5o5jokthdm52hpoksenkjsimaa7" greater the NextOwner-Name "b08luj3pbrhf4fi12huviuooi4cksalc", so the NSEC3 covers the end of the zone. The hashed query name "3ctvavk6hlrndo3vfreokthg6g3sroo9" comes before the hashed NextOwner, so the zone confirmes the not-existence of that TLSA RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner n6t4s5o5jokthdm52hpoksenkjsimaa7.dunsel.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
Zone: www.dunsel.dedyn.io
|
|
www.dunsel.dedyn.io
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 11125, DigestType 2 and Digest vp/LKhb6MZKtf5Wr+FPoRsYUPp3jBYgOqGiBbi2mfeY=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 11125, DigestType 4 and Digest OxeA6wH81NpjJbmL/HYRqlLL4vo2WPariajreh/QodaKGNB/jGgqhJhnF9POKlAJ
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner dunsel.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 35233, Signer-Name: dedyn.io
|
|
|
|
|
| • not checked
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: dunsel.dedyn.io
Validated: RRSIG-Owner www.dunsel.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 27.03.2025, 00:00:00 +, Signature-Inception: 06.03.2025, 00:00:00 +, KeyTag 11125, Signer-Name: dunsel.dedyn.io
|