Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26470, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 61050, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.01.2025, 00:00:00 +, Signature-Inception: 01.01.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ch
|
|
ch
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 14051, DigestType 2 and Digest q/C5xWKC8FWNWbXu8PiBt9tPOQQ5ckEf2wbmZZOp6LE=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner ch., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.01.2025, 17:00:00 +, Signature-Inception: 10.01.2025, 16:00:00 +, KeyTag 26470, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26470 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 442, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 14051, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 57263, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner ch., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 03.02.2025, 10:09:09 +, Signature-Inception: 19.12.2024, 09:09:09 +, KeyTag 14051, Signer-Name: ch
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 14051 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 14051, DigestType 2 and Digest "q/C5xWKC8FWNWbXu8PiBt9tPOQQ5ckEf2wbmZZOp6LE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: gy-sin.ch
|
|
gy-sin.ch
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 53392, DigestType 2 and Digest MKQvQT8ZO7hnjCM7Z7Ik6WUOaf+Juy48ia91bj4auXs=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner gy-sin.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 04.02.2025, 14:43:26 +, Signature-Inception: 05.01.2025, 14:01:58 +, KeyTag 442, Signer-Name: ch
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 442 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 24352, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 53392, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner gy-sin.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 30.01.2025, 13:52:07 +, Signature-Inception: 09.01.2025, 13:15:06 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| RRSIG-Owner gy-sin.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 30.01.2025, 13:52:07 +, Signature-Inception: 09.01.2025, 13:15:06 +, KeyTag 53392, Signer-Name: gy-sin.ch
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 24352 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 53392 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 53392, DigestType 2 and Digest "MKQvQT8ZO7hnjCM7Z7Ik6WUOaf+Juy48ia91bj4auXs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: fw.gy-sin.ch
|
|
fw.gy-sin.ch
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 84.74.64.189
Validated: RRSIG-Owner fw.gy-sin.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2025, 05:06:11 +, Signature-Inception: 06.01.2025, 04:15:45 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "fw.gy-sin.ch" equal the NSEC-owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner fw.gy-sin.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2025, 16:45:06 +, Signature-Inception: 06.01.2025, 16:06:52 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "fw.gy-sin.ch" equal the NSEC-owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner fw.gy-sin.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2025, 16:45:06 +, Signature-Inception: 06.01.2025, 16:06:52 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "fw.gy-sin.ch" equal the NSEC-owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner fw.gy-sin.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2025, 16:45:06 +, Signature-Inception: 06.01.2025, 16:06:52 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.fw.gy-sin.ch) sends a valid NSEC RR as result with the owner name fw.gy-sin.ch. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.fw.gy-sin.ch) sends a valid NSEC RR as result with the query name "_443._tcp.fw.gy-sin.ch" between the NSEC-owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.fw.gy-sin.ch) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.fw.gy-sin.ch" between the NSEC-owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner fw.gy-sin.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2025, 16:45:06 +, Signature-Inception: 06.01.2025, 16:06:52 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "fw.gy-sin.ch" equal the NSEC-owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner fw.gy-sin.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2025, 16:45:06 +, Signature-Inception: 06.01.2025, 16:06:52 +, KeyTag 24352, Signer-Name: gy-sin.ch
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.fw.gy-sin.ch
|
|
www.fw.gy-sin.ch
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "fw.gy-sin.ch" and the NextOwner "homeassistant.gy-sin.ch". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|