Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.05.2019, 00:00:00 +, Signature-Inception: 01.05.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.05.2019, 05:00:00 +, Signature-Inception: 05.05.2019, 04:00:00 +, KeyTag 25266, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3800, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 17.05.2019, 18:25:33 +, Signature-Inception: 02.05.2019, 18:20:33 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: magooweb.com
|
|
magooweb.com
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner magooweb.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 12.05.2019, 04:34:54 +, Signature-Inception: 05.05.2019, 03:24:54 +, KeyTag 3800, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3800 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 5208, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 26159, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner magooweb.com., Algorithm: 7, 2 Labels, original TTL: 10800 sec, Signature-expiration: 04.06.2019, 05:05:10 +, Signature-Inception: 05.05.2019, 05:05:10 +, KeyTag 5208, Signer-Name: magooweb.com
|
|
|
|
|
| RRSIG-Owner magooweb.com., Algorithm: 7, 2 Labels, original TTL: 10800 sec, Signature-expiration: 04.06.2019, 05:05:10 +, Signature-Inception: 05.05.2019, 05:05:10 +, KeyTag 26159, Signer-Name: magooweb.com
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 5208 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 26159 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 5208, DigestType 2 and Digest "NA/agWGCmLVO/fZxrf+PIfdGG1anAwuzgLnw93Oi2w8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: harpoon.magooweb.com
|
|
harpoon.magooweb.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "ppg8d1j09dgqrqgh0odp7idgjit1r3g2" between the hashed NSEC3-owner "ppg8d1j09dgqrqgh0odp7idgjit1r3g2" and the hashed NextOwner "spua36s8tm8ejvp5u2t9335d7tmufbqt". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner ppg8d1j09dgqrqgh0odp7idgjit1r3g2.magooweb.com., Algorithm: 7, 3 Labels, original TTL: 86400 sec, Signature-expiration: 04.06.2019, 05:05:10 +, Signature-Inception: 05.05.2019, 05:05:10 +, KeyTag 26159, Signer-Name: magooweb.com
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 51.254.33.11
Validated: RRSIG-Owner harpoon.magooweb.com., Algorithm: 7, 3 Labels, original TTL: 10800 sec, Signature-expiration: 04.06.2019, 05:05:10 +, Signature-Inception: 05.05.2019, 05:05:10 +, KeyTag 26159, Signer-Name: magooweb.com
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-04 05:05:10 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-04 05:05:10 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-04 05:05:10 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-04 05:05:10 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: CNAME, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-04 05:05:10 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-04 05:05:10 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, RRSIG
|
|
|
Zone: www.harpoon.magooweb.com
|
|
www.harpoon.magooweb.com
| 0 DS RR in the parent zone found
|