Zone (*) DNSSEC - Informations Zone : (root)(root) 1 DS RR published DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
• Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 46780, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2023, 00:00:00 +, Signature-Inception: 20.11.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : frfr 1 DS RR in the parent zone found DS with Algorithm 13, KeyTag 29133, DigestType 2 and Digest EwPo2o+2DbUA1b6h7l3JorzJPf4vxD00ZXZlj+zPV0k=
1 RRSIG RR to validate DS RR found RRSIG-Owner fr., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 04.12.2023, 22:00:00 +, Signature-Inception: 21.11.2023, 21:00:00 +, KeyTag 46780, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46780 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 29133, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 60747, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner fr., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 19.01.2024, 14:30:45 +, Signature-Inception: 20.11.2023, 14:26:31 +, KeyTag 29133, Signer-Name: fr
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 29133 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 29133, DigestType 2 and Digest "EwPo2o+2DbUA1b6h7l3JorzJPf4vxD00ZXZlj+zPV0k=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : hogwarts.frhogwarts.fr 2 DS RR in the parent zone found DS with Algorithm 13, KeyTag 32818, DigestType 2 and Digest A81OujzNJ49+0U+tRsAONEZaW2HnSHYT3g3kfMaM5BA=
DS with Algorithm 13, KeyTag 54691, DigestType 2 and Digest kQyOBDey4xp9W2+E2HqV3KNBE6+C5lyBJv/nKH+7ZG8=
1 RRSIG RR to validate DS RR found RRSIG-Owner hogwarts.fr., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.01.2024, 06:43:10 +, Signature-Inception: 12.11.2023, 06:15:14 +, KeyTag 60747, Signer-Name: fr
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 60747 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 32818, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 54691, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner hogwarts.fr., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 04.12.2023, 17:05:01 +, Signature-Inception: 20.11.2023, 16:05:01 +, KeyTag 32818, Signer-Name: hogwarts.fr
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 32818 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 32818, DigestType 2 and Digest "A81OujzNJ49+0U+tRsAONEZaW2HnSHYT3g3kfMaM5BA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : intra.hogwarts.frintra.hogwarts.fr 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "4lg1epo32ogvbi7fk07qd77npv3s59t3" between the hashed NSEC3-owner "3u44bl9t2jir8qlt64ci7eudejfqjt7v" and the hashed NextOwner "8dmmbudvqbnsguk0c2thovh1de5tg8ep". So the parent zone confirmes the not-existence of a DS RR.Bitmap: A, RRSIG Validated: RRSIG-Owner 3u44bl9t2jir8qlt64ci7eudejfqjt7v.hogwarts.fr., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 04.12.2023, 05:56:37 +, Signature-Inception: 20.11.2023, 05:12:21 +, KeyTag 54691, Signer-Name: hogwarts.fr
DS-Query in the parent zone sends valid NSEC3 RR with the Hash "vnr4s0dgcotcv3eseamvr1d6a46t87np" as Owner. That's the Hash of "hogwarts.fr" with the NextHashedOwnerName "0ocbun26thr8mr7dmi5eudqr6usvg5ol". So that domain name is the Closest Encloser of "intra.hogwarts.fr". Opt-Out: False.Bitmap: NS, SOA, MX, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner vnr4s0dgcotcv3eseamvr1d6a46t87np.hogwarts.fr., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 04.12.2023, 17:05:01 +, Signature-Inception: 20.11.2023, 16:05:01 +, KeyTag 54691, Signer-Name: hogwarts.fr
The ClosestEncloser says, that "*.hogwarts.fr" with the Hash "50jpq8fc2qtr00i752aha9dgv2k9gsrf" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "3u44bl9t2jir8qlt64ci7eudejfqjt7v" and the Next Owner "8dmmbudvqbnsguk0c2thovh1de5tg8ep", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.Bitmap: A, RRSIG Validated: RRSIG-Owner 3u44bl9t2jir8qlt64ci7eudejfqjt7v.hogwarts.fr., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 04.12.2023, 05:56:37 +, Signature-Inception: 20.11.2023, 05:12:21 +, KeyTag 54691, Signer-Name: hogwarts.fr
2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 26854, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 41361, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner intra.hogwarts.fr., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 26854, Signer-Name: intra.hogwarts.fr
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 26854 used to validate the DNSKEY RRSetError: DNSKEY 26854 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created. A-Query sends a valid NSEC3 RR as result with the hashed query name "4lg1epo32ogvbi7fk07qd77npv3s59t3" equal the hashed NSEC3-owner "4lg1epo32ogvbi7fk07qd77npv3s59t3" and the hashed NextOwner "4nqsnghjjlt7jjmn5df1fqm3puapdn8u". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NoData-Proof required and found. CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "4lg1epo32ogvbi7fk07qd77npv3s59t3" equal the hashed NSEC3-owner "4lg1epo32ogvbi7fk07qd77npv3s59t3" and the hashed NextOwner "4nqsnghjjlt7jjmn5df1fqm3puapdn8u". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NoData-Proof required and found. TXT-Query sends a valid NSEC3 RR as result with the hashed query name "4lg1epo32ogvbi7fk07qd77npv3s59t3" equal the hashed NSEC3-owner "4lg1epo32ogvbi7fk07qd77npv3s59t3" and the hashed NextOwner "4nqsnghjjlt7jjmn5df1fqm3puapdn8u". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NoData-Proof required and found. AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "4lg1epo32ogvbi7fk07qd77npv3s59t3" equal the hashed NSEC3-owner "4lg1epo32ogvbi7fk07qd77npv3s59t3" and the hashed NextOwner "4nqsnghjjlt7jjmn5df1fqm3puapdn8u". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NoData-Proof required and found. TLSA-Query (_443._tcp.intra.hogwarts.fr) sends a valid NSEC3 RR as result with the hashed owner name "4lg1epo32ogvbi7fk07qd77npv3s59t3" (unhashed: intra.hogwarts.fr). So that's the Closest Encloser of the query name. Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "ddi0att6f8f6ntg5iinl9dofueacbcab" (unhashed: _tcp.intra.hogwarts.fr) with the owner "cm0tur6m3k37mrll9f78vgdhal19qp0h" and the NextOwner "e6ql94cokda2oq54dv778cfq69tfgesc". So that NSEC3 confirms the not-existence of the Next Closer Name. Bitmap: A, RRSIG Validated: RRSIG-Owner cm0tur6m3k37mrll9f78vgdhal19qp0h.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 30.11.2023, 21:18:02 +, Signature-Inception: 20.11.2023, 14:55:29 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "q1msojk4rg0vu1m471nklnsv8a44920f" (unhashed: *.intra.hogwarts.fr) with the owner "psur1gf6at8s90vpsrq52henpi35s9ri" and the NextOwner "q9hs2akgeaasjagsg3f1rqk0ur5e88ks". So that NSEC3 confirms the not-existence of the Wildcard expansion. Bitmap: A, RRSIG Validated: RRSIG-Owner psur1gf6at8s90vpsrq52henpi35s9ri.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 30.11.2023, 11:43:36 +, Signature-Inception: 20.11.2023, 14:54:34 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NXDomain-Proof required and found. CAA-Query sends a valid NSEC3 RR as result with the hashed query name "4lg1epo32ogvbi7fk07qd77npv3s59t3" equal the hashed NSEC3-owner "4lg1epo32ogvbi7fk07qd77npv3s59t3" and the hashed NextOwner "4nqsnghjjlt7jjmn5df1fqm3puapdn8u". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
Status: Good. NoData-Proof required and found. Zone : www.intra.hogwarts.frwww.intra.hogwarts.fr 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "9mgsfkqos925pob5v04u3f3vu36i1iq0" between the hashed NSEC3-owner "9choi1ebb4v2sffm06ginijrjbe4tjll" and the hashed NextOwner "a3q9hqn9pbjj1dc44dluv747vn4e7qtg". So the parent zone confirmes the not-existence of a DS RR.Bitmap: A, RRSIG Validated: RRSIG-Owner 9choi1ebb4v2sffm06ginijrjbe4tjll.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 27.11.2023, 01:12:32 +, Signature-Inception: 20.11.2023, 15:00:32 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
DS-Query in the parent zone sends valid NSEC3 RR with the Hash "4lg1epo32ogvbi7fk07qd77npv3s59t3" as Owner. That's the Hash of "intra.hogwarts.fr" with the NextHashedOwnerName "4nqsnghjjlt7jjmn5df1fqm3puapdn8u". So that domain name is the Closest Encloser of "www.intra.hogwarts.fr". Opt-Out: False.Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 4lg1epo32ogvbi7fk07qd77npv3s59t3.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 05.12.2023, 23:02:54 +, Signature-Inception: 21.11.2023, 22:02:54 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr
The ClosestEncloser says, that "*.intra.hogwarts.fr" with the Hash "q1msojk4rg0vu1m471nklnsv8a44920f" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "psur1gf6at8s90vpsrq52henpi35s9ri" and the Next Owner "q9hs2akgeaasjagsg3f1rqk0ur5e88ks", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.Bitmap: A, RRSIG Validated: RRSIG-Owner psur1gf6at8s90vpsrq52henpi35s9ri.intra.hogwarts.fr., Algorithm: 13, 4 Labels, original TTL: 86400 sec, Signature-expiration: 30.11.2023, 11:43:36 +, Signature-Inception: 20.11.2023, 14:54:34 +, KeyTag 41361, Signer-Name: intra.hogwarts.fr