Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 22545, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 33853, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.01.2020, 00:00:00 +, Signature-Inception: 20.12.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: srl
|
|
srl
| 2 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner srl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 09.01.2020, 05:00:00 +, Signature-Inception: 27.12.2019, 04:00:00 +, KeyTag 22545, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 3327, Flags 256
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 16923, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 41908, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 50450, Flags 256
|
|
|
|
|
| 3 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner srl., Algorithm: 7, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.01.2020, 18:21:12 +, Signature-Inception: 25.12.2019, 17:21:12 +, KeyTag 3327, Signer-Name: srl
|
|
|
|
|
| RRSIG-Owner srl., Algorithm: 7, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.01.2020, 18:21:12 +, Signature-Inception: 25.12.2019, 17:21:12 +, KeyTag 16923, Signer-Name: srl
|
|
|
|
|
| RRSIG-Owner srl., Algorithm: 7, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.01.2020, 18:21:12 +, Signature-Inception: 25.12.2019, 17:21:12 +, KeyTag 41908, Signer-Name: srl
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 3327 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 16923 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 41908 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 16923, DigestType 1 and Digest "0jjMrKuYnLR61UKqsaujK7YBzjM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 16923, DigestType 2 and Digest "3cCEMuhTTy+46MI8qwgmPnTHraW8UsF7PAMkWGhpCTg=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: techs.srl
|
|
techs.srl
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner techs.srl., Algorithm: 7, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.01.2020, 18:21:12 +, Signature-Inception: 25.12.2019, 17:21:12 +, KeyTag 3327, Signer-Name: srl
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 3327 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 5070, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 40154, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner techs.srl., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.01.2020, 19:56:08 +, Signature-Inception: 18.12.2019, 19:56:08 +, KeyTag 5070, Signer-Name: techs.srl
|
|
|
|
|
| RRSIG-Owner techs.srl., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.01.2020, 19:56:08 +, Signature-Inception: 18.12.2019, 19:56:08 +, KeyTag 40154, Signer-Name: techs.srl
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 5070 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 40154 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 5070, DigestType 2 and Digest "GU5zePt0N84vtWda8Dooqs5P19QylWboJeaAbW/zI00=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: git.techs.srl
|
|
git.techs.srl
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "4j77dh8mncvej9t6ccpaas0qihg8fs6i" between the hashed NSEC3-owner "4j77dh8mncvej9t6ccpaas0qihg8fs6i" and the hashed NextOwner "86muthsmd291vp0qm8guv9bvkbaudouq". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner 4j77dh8mncvej9t6ccpaas0qihg8fs6i.techs.srl., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 17.01.2020, 19:56:08 +, Signature-Inception: 18.12.2019, 19:56:08 +, KeyTag 40154, Signer-Name: techs.srl
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 213.215.138.150
Validated: RRSIG-Owner git.techs.srl., Algorithm: 7, 3 Labels, original TTL: 3600 sec, Signature-expiration: 17.01.2020, 19:56:08 +, Signature-Inception: 18.12.2019, 19:56:08 +, KeyTag 40154, Signer-Name: techs.srl
|
|
|
|
|
| RRSIG Type 50, expiration 2020-01-17 19:56:08 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2020-01-17 19:56:08 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2020-01-17 19:56:08 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2020-01-17 19:56:08 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2020-01-17 19:56:08 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, RRSIG
|
|
|
Zone: www.git.techs.srl
|
|
www.git.techs.srl
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "e6snnhti6c2nthhlfm2sa5905l44vjnh" between the hashed NSEC3-owner "be4ts59glatm0dgkb8inkr3eka91jg3p" and the hashed NextOwner "e9sm9um1der0fg4r3740lm4g8dj0oio7". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner be4ts59glatm0dgkb8inkr3eka91jg3p.techs.srl., Algorithm: 7, 3 Labels, original TTL: 300 sec, Signature-expiration: 17.01.2020, 19:56:08 +, Signature-Inception: 18.12.2019, 19:56:08 +, KeyTag 40154, Signer-Name: techs.srl
|