Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 33853, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.04.2020, 00:00:00 +, Signature-Inception: 11.03.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: net
|
|
net
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 01.04.2020, 05:00:00 +, Signature-Inception: 19.03.2020, 04:00:00 +, KeyTag 33853, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 33853 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 24512, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 35886, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.03.2020, 16:28:30 +, Signature-Inception: 15.03.2020, 16:23:30 +, KeyTag 35886, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35886 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest "eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: fischerp.net
|
|
fischerp.net
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "9bngknvk9c0rh8rmcerv4lkd68anea79" between the hashed NSEC3-owner "9bnfrga2hfko6n0gka23v615g4mj8oo4" and the hashed NextOwner "9bnhbfm1mpt40o4jaqppv0rh0kqdjhuf". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 9bnfrga2hfko6n0gka23v615g4mj8oo4.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 24.03.2020, 06:33:40 +, Signature-Inception: 17.03.2020, 05:23:40 +, KeyTag 24512, Signer-Name: net
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner fischerp.net., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.04.2020, 09:02:41 +, Signature-Inception: 18.02.2020, 09:02:41 +, KeyTag 2371, Signer-Name: fischerp.net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 85.214.120.143
Validated: RRSIG-Owner fischerp.net., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 20.03.2020, 14:14:01 +, Signature-Inception: 18.03.2020, 12:14:01 +, KeyTag 34505, Signer-Name: fischerp.net
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 9|issuewildletsencrypt.org
Validated: RRSIG-Owner fischerp.net., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 20.03.2020, 14:14:01 +, Signature-Inception: 18.03.2020, 12:14:01 +, KeyTag 34505, Signer-Name: fischerp.net
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-20 14:14:01 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner fischerp.net, NextOwner: \000.fischerp.net.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-20 14:14:01 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner fischerp.net, NextOwner: \000.fischerp.net.
Bitmap: A, NS, SOA, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-20 14:14:01 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner fischerp.net, NextOwner: \000.fischerp.net.
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-20 14:14:01 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.fischerp.net, NextOwner: \000._443._tcp.fischerp.net.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, HIP, 61, 99, CAA
|
|
|
Zone: www.fischerp.net
|
|
www.fischerp.net
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.fischerp.net" and the NextOwner "\000.www.fischerp.net". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|