Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14631, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 12.05.2021, 00:00:00 +, Signature-Inception: 21.04.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: net
|
|
net
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 04.05.2021, 22:00:00 +, Signature-Inception: 21.04.2021, 21:00:00 +, KeyTag 14631, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14631 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 6203, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 35886, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 04.05.2021, 16:28:30 +, Signature-Inception: 19.04.2021, 16:23:30 +, KeyTag 35886, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35886 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest "eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: gopherdata.net
|
|
gopherdata.net
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 464, DigestType 2 and Digest 8vz/o6TlQyRwSOLy1UlVVI47BYWQOX7fdS7qtbJOepU=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner gopherdata.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 28.04.2021, 05:27:32 +, Signature-Inception: 21.04.2021, 04:17:32 +, KeyTag 6203, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 6203 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 464, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34839, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 464, Signer-Name: gopherdata.net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 464 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 464, DigestType 2 and Digest "8vz/o6TlQyRwSOLy1UlVVI47BYWQOX7fdS7qtbJOepU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 35.208.39.50
Validated: RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 mx -all
google-site-verification=Rb4DDGSPgQig5QNdnAuKFMuJz1R4AIxGpgysfKPd93o
Validated: RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 32773|issueletsencrypt.org
Validated: RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "gopherdata.net" equal the NSEC-owner "gopherdata.net" and the NextOwner "_dmarc.gopherdata.net". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CDS, CAA Validated: RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "gopherdata.net" equal the NSEC-owner "gopherdata.net" and the NextOwner "_dmarc.gopherdata.net". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CDS, CAA Validated: RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.gopherdata.net) sends a valid NSEC RR as result with the owner name gopherdata.net. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "gopherdata.net" and the NextOwner "_dmarc.gopherdata.net". So that NSEC confirms the not-existence of the Wildcard expansion.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY, CDS, CAA Validated: RRSIG-Owner gopherdata.net., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.gopherdata.net) sends a valid NSEC RR as result with the query name "_443._tcp.gopherdata.net" between the NSEC-owner "srv2._domainkey.gopherdata.net" and the NextOwner "www.gopherdata.net". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.gopherdata.net) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.gopherdata.net" between the NSEC-owner "srv2._domainkey.gopherdata.net" and the NextOwner "www.gopherdata.net". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner srv2._domainkey.gopherdata.net., Algorithm: 13, 4 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
Zone: www.gopherdata.net
|
|
www.gopherdata.net
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 35.208.39.50
Validated: RRSIG-Owner www.gopherdata.net., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.gopherdata.net" equal the NSEC-owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.gopherdata.net., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "www.gopherdata.net" equal the NSEC-owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.gopherdata.net., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.gopherdata.net" equal the NSEC-owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.gopherdata.net., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.gopherdata.net) sends a valid NSEC RR as result with the owner name www.gopherdata.net. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.www.gopherdata.net) sends a valid NSEC RR as result with the query name "_443._tcp.www.gopherdata.net" between the NSEC-owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.www.gopherdata.net) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.www.gopherdata.net" between the NSEC-owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.gopherdata.net., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.gopherdata.net" equal the NSEC-owner "www.gopherdata.net" and the NextOwner "gopherdata.net". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.gopherdata.net., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 13.05.2021, 00:48:49 +, Signature-Inception: 21.04.2021, 00:48:49 +, KeyTag 34839, Signer-Name: gopherdata.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|