Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 9799, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14748, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.01.2022, 00:00:00 +, Signature-Inception: 01.01.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: br
|
|
br
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2471, DigestType 2 and Digest Xk81mYuPkJVX+hGcTL/cotZgom8GnvAGtAN1igfRouQ=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner br., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 16.01.2022, 17:00:00 +, Signature-Inception: 03.01.2022, 16:00:00 +, KeyTag 9799, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 9799 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 728, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2471, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner br., Algorithm: 13, 1 Labels, original TTL: 21600 sec, Signature-expiration: 16.01.2022, 12:00:00 +, Signature-Inception: 26.12.2021, 12:00:00 +, KeyTag 2471, Signer-Name: br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2471 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2471, DigestType 2 and Digest "Xk81mYuPkJVX+hGcTL/cotZgom8GnvAGtAN1igfRouQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com.br
|
|
com.br
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 37443, DigestType 2 and Digest y3U8tEQXGa587/Z/jcVhaYUB8hwE7gn9JFXkTVR+seA=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com.br., Algorithm: 13, 2 Labels, original TTL: 21600 sec, Signature-expiration: 09.01.2022, 12:05:09 +, Signature-Inception: 26.12.2021, 11:05:09 +, KeyTag 728, Signer-Name: br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 728 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 37443, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com.br., Algorithm: 13, 2 Labels, original TTL: 21600 sec, Signature-expiration: 17.01.2022, 18:40:09 +, Signature-Inception: 03.01.2022, 17:40:09 +, KeyTag 37443, Signer-Name: com.br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37443 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37443, DigestType 2 and Digest "y3U8tEQXGa587/Z/jcVhaYUB8hwE7gn9JFXkTVR+seA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: guedesdesignco.com.br
|
|
guedesdesignco.com.br
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 40102, DigestType 2 and Digest kx7rk4QB/zDe7rWv6PZ14N268n0T/3sq3TClzHUMfIk=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 17.01.2022, 14:55:20 +, Signature-Inception: 03.01.2022, 13:55:20 +, KeyTag 37443, Signer-Name: com.br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37443 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 40102, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 40102 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 40102, DigestType 2 and Digest "kx7rk4QB/zDe7rWv6PZ14N268n0T/3sq3TClzHUMfIk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 34.205.101.17
Validated: RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "guedesdesignco.com.br" equal the NSEC-owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "guedesdesignco.com.br" equal the NSEC-owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "guedesdesignco.com.br" equal the NSEC-owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.guedesdesignco.com.br) sends a valid NSEC RR as result with the owner name guedesdesignco.com.br. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.guedesdesignco.com.br) sends a valid NSEC RR as result with the query name "_443._tcp.guedesdesignco.com.br" between the NSEC-owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.guedesdesignco.com.br) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.guedesdesignco.com.br" between the NSEC-owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "guedesdesignco.com.br" equal the NSEC-owner "guedesdesignco.com.br" and the NextOwner "www.guedesdesignco.com.br". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner guedesdesignco.com.br., Algorithm: 13, 3 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.guedesdesignco.com.br
|
|
www.guedesdesignco.com.br
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 34.205.101.17
Validated: RRSIG-Owner www.guedesdesignco.com.br., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.guedesdesignco.com.br" equal the NSEC-owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.guedesdesignco.com.br., Algorithm: 13, 4 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "www.guedesdesignco.com.br" equal the NSEC-owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.guedesdesignco.com.br., Algorithm: 13, 4 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.guedesdesignco.com.br" equal the NSEC-owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.guedesdesignco.com.br., Algorithm: 13, 4 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.guedesdesignco.com.br) sends a valid NSEC RR as result with the owner name www.guedesdesignco.com.br. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.www.guedesdesignco.com.br) sends a valid NSEC RR as result with the query name "_443._tcp.www.guedesdesignco.com.br" between the NSEC-owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.www.guedesdesignco.com.br) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.www.guedesdesignco.com.br" between the NSEC-owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.guedesdesignco.com.br., Algorithm: 13, 4 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.guedesdesignco.com.br" equal the NSEC-owner "www.guedesdesignco.com.br" and the NextOwner "guedesdesignco.com.br". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www.guedesdesignco.com.br., Algorithm: 13, 4 Labels, original TTL: 900 sec, Signature-expiration: 12.02.2022, 15:14:01 +, Signature-Inception: 03.01.2022, 14:14:01 +, KeyTag 40102, Signer-Name: guedesdesignco.com.br
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|