Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 12.05.2019, 00:00:00 +, Signature-Inception: 21.04.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: nu
|
|
nu
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner nu., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.05.2019, 05:00:00 +, Signature-Inception: 30.04.2019, 04:00:00 +, KeyTag 25266, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 41209, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 57674, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner nu., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 12.05.2019, 21:16:31 +, Signature-Inception: 28.04.2019, 19:35:08 +, KeyTag 41209, Signer-Name: nu
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 41209 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 41209, DigestType 2 and Digest "RhWRQhQLv4nstB4gL4jajH2KUbWEql6koozqqvkJEYU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: breuer.nu
|
|
breuer.nu
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner breuer.nu., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.05.2019, 07:53:57 +, Signature-Inception: 30.04.2019, 10:35:08 +, KeyTag 57674, Signer-Name: nu
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 57674 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 19305, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 21330, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34900, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner breuer.nu., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.05.2019, 00:00:00 +, Signature-Inception: 18.04.2019, 00:00:00 +, KeyTag 34900, Signer-Name: breuer.nu
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34900 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34900, DigestType 2 and Digest "qaNvc1nXFM25EkMnMVhVKC8U/j7a3Y77oajmiZBzr2I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: home.breuer.nu
|
|
home.breuer.nu
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "home.breuer.nu" and the NextOwner "mail.breuer.nu". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 85.149.135.243
Validated: RRSIG-Owner home.breuer.nu., Algorithm: 8, 3 Labels, original TTL: 600 sec, Signature-expiration: 09.05.2019, 00:00:00 +, Signature-Inception: 18.04.2019, 00:00:00 +, KeyTag 21330, Signer-Name: breuer.nu
|
|
|
|
|
| RRSIG Type 47, expiration 2019-05-09 00:00:00 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner home.breuer.nu, NextOwner: mail.breuer.nu.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-05-09 00:00:00 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner home.breuer.nu, NextOwner: mail.breuer.nu.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-05-09 00:00:00 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner home.breuer.nu, NextOwner: mail.breuer.nu.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-05-09 00:00:00 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner home.breuer.nu, NextOwner: mail.breuer.nu.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-05-09 00:00:00 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner home.breuer.nu, NextOwner: mail.breuer.nu.
Bitmap: A, RRSIG, NSEC
|
|
|
Zone: www.home.breuer.nu
|
|
www.home.breuer.nu
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "home.breuer.nu" and the NextOwner "mail.breuer.nu". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|