Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26838, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.08.2021, 00:00:00 +, Signature-Inception: 11.07.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: de
|
|
de
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26755, DigestType 2 and Digest 80E1eAmllUMRzLgq3hFMbB1ySnXAOVE3qjl4A1Ql540=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner de., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 29.07.2021, 05:00:00 +, Signature-Inception: 16.07.2021, 04:00:00 +, KeyTag 26838, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26838 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26739, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26755, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 56844, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner de., Algorithm: 8, 1 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2021, 14:34:30 +, Signature-Inception: 13.07.2021, 13:04:30 +, KeyTag 26755, Signer-Name: de
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26755 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26755, DigestType 2 and Digest "80E1eAmllUMRzLgq3hFMbB1ySnXAOVE3qjl4A1Ql540=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: eoda.de
|
|
eoda.de
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 7, KeyTag 615, DigestType 2 and Digest Rf6CXldZQSeVSbuvsXyZShNOR0lH6Aktx0misELaBao=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner eoda.de., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 29.07.2021, 04:59:57 +, Signature-Inception: 15.07.2021, 03:29:57 +, KeyTag 56844, Signer-Name: de
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 56844 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 615, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 39497, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner eoda.de., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 615, Signer-Name: eoda.de
|
|
|
|
|
| RRSIG-Owner eoda.de., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 615 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 39497 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 615, DigestType 2 and Digest "Rf6CXldZQSeVSbuvsXyZShNOR0lH6Aktx0misELaBao=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 162.55.39.99
Validated: RRSIG-Owner eoda.de., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: MS=ms45662833
have-i-been-pwned-verification=c5de815af8e6c871ca69dcc4e14075a4
google-site-verification=eLk9JXlR-HipOQ8m9cqojFfOUW7LIGuaiCJkwusVwmY
v=spf1 include:spf.protection.outlook.com include:servers.mcsv.net include:spf.crsend.com -all
Validated: RRSIG-Owner eoda.de., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" equal the hashed NSEC3-owner "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" and the hashed NextOwner "dssnk2h4haa5jk6keodpjfp3tmto8ifb". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner dqbbj4hfufp36cvntkgrarv1cb3ecp1u.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" equal the hashed NSEC3-owner "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" and the hashed NextOwner "dssnk2h4haa5jk6keodpjfp3tmto8ifb". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner dqbbj4hfufp36cvntkgrarv1cb3ecp1u.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.eoda.de) sends a valid NSEC3 RR as result with the hashed owner name "e47nnqii2dg4nuuo4n61h48g3ek4tsh6" (unhashed: _tcp.eoda.de). So that's the Closest Encloser of the query name.
Bitmap: No Bitmap? Validated: RRSIG-Owner e47nnqii2dg4nuuo4n61h48g3ek4tsh6.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.eoda.de) sends a valid NSEC3 RR as result with the hashed query name "fqo0afsrvosmb77612dcu2681gvb30ev" between the hashed NSEC3-owner "egbknpppmgr4bd85523jlb8dq7ksbek5" and the hashed NextOwner "h1pslnbjclet2geqrrhu74arqd81d5r7". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner egbknpppmgr4bd85523jlb8dq7ksbek5.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "uec9p6ta541e1if4jcuiura9ssrvq5nn" (unhashed: *._tcp.eoda.de) with the owner "uchrhbvse7t8il1f49n6817df1uehika" and the NextOwner "v7tjogkun5pihsge798maiu46ef96jo2". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner uchrhbvse7t8il1f49n6817df1uehika.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" equal the hashed NSEC3-owner "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" and the hashed NextOwner "dssnk2h4haa5jk6keodpjfp3tmto8ifb". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner dqbbj4hfufp36cvntkgrarv1cb3ecp1u.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.eoda.de
|
|
www.eoda.de
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone sends valid NSEC3 RR with the Hash "dqbbj4hfufp36cvntkgrarv1cb3ecp1u" as Owner. That's the Hash of "eoda.de" with the NextHashedOwnerName "dssnk2h4haa5jk6keodpjfp3tmto8ifb". So that domain name is the Closest Encloser of "www.eoda.de". Opt-Out: False.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner dqbbj4hfufp36cvntkgrarv1cb3ecp1u.eoda.de., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: eoda.de
Validated: RRSIG-Owner www.eoda.de., Algorithm: 7, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2021, 00:16:57 +, Signature-Inception: 15.07.2021, 00:16:57 +, KeyTag 39497, Signer-Name: eoda.de
|