Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 5613, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30903, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.04.2024, 00:00:00 +, Signature-Inception: 01.04.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.04.2024, 18:00:00 +, Signature-Inception: 02.04.2024, 17:00:00 +, KeyTag 5613, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 5613 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3093, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 55149, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.04.2024, 15:25:12 +, Signature-Inception: 01.04.2024, 14:25:12 +, KeyTag 26974, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: isabelallende.org
|
|
isabelallende.org
| 3 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 26599, DigestType 1 and Digest fCv2Gr/CTao8a7HeFmGGB3Khj90=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 26599, DigestType 2 and Digest kWMB5AhoRbN7TqpxVzgpzpCjcgjb9/076+KD9JLAOGI=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 26599, DigestType 4 and Digest MOeCJyu8X4Vcq99gKoSIIS6iGkXFRsQyn5HaEcyfZf9oG/YrLiCQp6oubI1n3a0D
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner isabelallende.org., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 22.04.2024, 15:25:12 +, Signature-Inception: 01.04.2024, 14:25:12 +, KeyTag 3093, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3093 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 26599, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 26599 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 26599, DigestType 1 and Digest "fCv2Gr/CTao8a7HeFmGGB3Khj90=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 26599, DigestType 2 and Digest "kWMB5AhoRbN7TqpxVzgpzpCjcgjb9/076+KD9JLAOGI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 26599, DigestType 4 and Digest "MOeCJyu8X4Vcq99gKoSIIS6iGkXFRsQyn5HaEcyfZf9oG/YrLiCQp6oubI1n3a0D" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 216.71.104.30
Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.isabelallende.org) sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
Zone: www.isabelallende.org
|
|
www.isabelallende.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "isabelallende.org" and the NextOwner "isabelallende.org". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 216.71.104.30
Validated: RRSIG-Owner www.isabelallende.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| TLSA-Query (_443._tcp.www.isabelallende.org) sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the NSEC-owner "isabelallende.org" equal the NextOwner "isabelallende.org". So the zone confirmes that no other domain name exists.
Bitmap: A, NS, SOA, MX, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner isabelallende.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 00:00:00 +, Signature-Inception: 21.03.2024, 00:00:00 +, KeyTag 26599, Signer-Name: isabelallende.org
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|