Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.06.2019, 00:00:00 +, Signature-Inception: 31.05.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: nl
|
|
nl
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.06.2019, 17:00:00 +, Signature-Inception: 05.06.2019, 16:00:00 +, KeyTag 25266, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34112, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 46123, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 10.06.2019, 12:24:13 +, Signature-Inception: 27.05.2019, 12:37:02 +, KeyTag 34112, Signer-Name: nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34112 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34112, DigestType 2 and Digest "PFtfmzVXRVxQdRqb6evpI4yI4Z9fB/kwl2kXtRuVzSI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: i-peek.nl
|
|
i-peek.nl
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner i-peek.nl., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 10.06.2019, 07:00:30 +, Signature-Inception: 27.05.2019, 00:38:02 +, KeyTag 46123, Signer-Name: nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46123 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 115, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 39740, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner i-peek.nl., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.06.2019, 00:00:00 +, Signature-Inception: 23.05.2019, 00:00:00 +, KeyTag 39740, Signer-Name: i-peek.nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 39740 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 39740, DigestType 2 and Digest "XZCrDe7niZM01X9kMxd6qRzQBHRc/UDagCyaDo839ZA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 46.137.96.254
Validated: RRSIG-Owner i-peek.nl., Algorithm: 8, 2 Labels, original TTL: 617 sec, Signature-expiration: 13.06.2019, 00:00:00 +, Signature-Inception: 23.05.2019, 00:00:00 +, KeyTag 115, Signer-Name: i-peek.nl
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issueletsencrypt.org
Validated: RRSIG-Owner i-peek.nl., Algorithm: 8, 2 Labels, original TTL: 617 sec, Signature-expiration: 13.06.2019, 00:00:00 +, Signature-Inception: 23.05.2019, 00:00:00 +, KeyTag 115, Signer-Name: i-peek.nl
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, NS, SOA, MX, RRSIG, DNSKEY, NSEC3PARAM, CAA
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, NS, SOA, MX, RRSIG, DNSKEY, NSEC3PARAM, CAA
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, NS, SOA, MX, RRSIG, DNSKEY, NSEC3PARAM, CAA
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, NS, SOA, MX, RRSIG, DNSKEY, NSEC3PARAM, CAA
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, RRSIG
|
|
|
Zone: www.i-peek.nl
|
|
www.i-peek.nl
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "m9jbk3fsnm9fism4pgj8mmrdrses1ggt" between the hashed NSEC3-owner "m9jbk3fsnm9fism4pgj8mmrdrses1ggt" and the hashed NextOwner "o9j24ehkrbsoph705ll67tgi4fudufuv". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner m9jbk3fsnm9fism4pgj8mmrdrses1ggt.i-peek.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 13.06.2019, 00:00:00 +, Signature-Inception: 23.05.2019, 00:00:00 +, KeyTag 115, Signer-Name: i-peek.nl
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 46.137.96.254
Validated: RRSIG-Owner www.i-peek.nl., Algorithm: 8, 3 Labels, original TTL: 617 sec, Signature-expiration: 13.06.2019, 00:00:00 +, Signature-Inception: 23.05.2019, 00:00:00 +, KeyTag 115, Signer-Name: i-peek.nl
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-06-13 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, RRSIG
|