Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 59944, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2019, 00:00:00 +, Signature-Inception: 31.07.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.08.2019, 05:00:00 +, Signature-Inception: 05.08.2019, 04:00:00 +, KeyTag 59944, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 17708, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.08.2019, 18:25:33 +, Signature-Inception: 31.07.2019, 18:20:33 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: frankpanduh.com
|
|
frankpanduh.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "ijugmbgqkeg7dm88fiuunt5bl1nkkbet" between the hashed NSEC3-owner "ijufmcncqggtln0i2ngptq7c3npsjaur" and the hashed NextOwner "ijuh4sr93j8bg8rbc5feacbijiosr6so". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner ijufmcncqggtln0i2ngptq7c3npsjaur.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 10.08.2019, 04:48:51 +, Signature-Inception: 03.08.2019, 03:38:51 +, KeyTag 17708, Signer-Name: com
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner frankpanduh.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 30.08.2019, 23:05:44 +, Signature-Inception: 01.07.2019, 23:05:44 +, KeyTag 2371, Signer-Name: frankpanduh.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.27.190.63
104.27.191.63
Validated: RRSIG-Owner frankpanduh.com., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 06.08.2019, 10:33:27 +, Signature-Inception: 04.08.2019, 08:33:27 +, KeyTag 34505, Signer-Name: frankpanduh.com
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 a:domain.com -all
Validated: RRSIG-Owner frankpanduh.com., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 06.08.2019, 10:33:27 +, Signature-Inception: 04.08.2019, 08:33:27 +, KeyTag 34505, Signer-Name: frankpanduh.com
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2606:4700:0030:0000:0000:0000:681B:BE3F
2606:4700:0030:0000:0000:0000:681B:BF3F
Validated: RRSIG-Owner frankpanduh.com., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 06.08.2019, 10:33:27 +, Signature-Inception: 04.08.2019, 08:33:27 +, KeyTag 34505, Signer-Name: frankpanduh.com
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issuecomodoca.com
5|issuedigicert.com
5|issueletsencrypt.org
9|issuewildcomodoca.com
9|issuewilddigicert.com
9|issuewildletsencrypt.org
Validated: RRSIG-Owner frankpanduh.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 06.08.2019, 10:33:27 +, Signature-Inception: 04.08.2019, 08:33:27 +, KeyTag 34505, Signer-Name: frankpanduh.com
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:27 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner frankpanduh.com, NextOwner: \000.frankpanduh.com.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:27 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.frankpanduh.com, NextOwner: \000._443._tcp.frankpanduh.com.
Bitmap: RRSIG, NSEC
|
|
|
Zone: www.frankpanduh.com
|
|
www.frankpanduh.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.frankpanduh.com" and the NextOwner "\000.www.frankpanduh.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.27.190.63
104.27.191.63
Validated: RRSIG-Owner www.frankpanduh.com., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 06.08.2019, 10:33:28 +, Signature-Inception: 04.08.2019, 08:33:28 +, KeyTag 34505, Signer-Name: frankpanduh.com
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:28 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner www.frankpanduh.com, NextOwner: \000.www.frankpanduh.com.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:28 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner www.frankpanduh.com, NextOwner: \000.www.frankpanduh.com.
Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:28 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner www.frankpanduh.com, NextOwner: \000.www.frankpanduh.com.
Bitmap: A, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:28 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.www.frankpanduh.com, NextOwner: \000._443._tcp.www.frankpanduh.com.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-08-06 10:33:28 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner www.frankpanduh.com, NextOwner: \000.www.frankpanduh.com.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|