Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 5613, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20038, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.07.2024, 00:00:00 +, Signature-Inception: 01.07.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: kg
|
|
kg
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 45982, DigestType 2 and Digest 1kKvjJu3YeA1znekh1C7qmS0HPoHmdjZRJjPozX6E4A=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner kg., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.07.2024, 05:00:00 +, Signature-Inception: 10.07.2024, 04:00:00 +, KeyTag 20038, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20038 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3529, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 45982, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner kg., Algorithm: 8, 1 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:51 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| RRSIG-Owner kg., Algorithm: 8, 1 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:51 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 45982, Signer-Name: kg
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3529 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 45982 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 45982, DigestType 2 and Digest "1kKvjJu3YeA1znekh1C7qmS0HPoHmdjZRJjPozX6E4A=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: energo.kg
|
|
energo.kg
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "energo.kg" and the NextOwner "ENERGO-ES.kg". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: jae.energo.kg
|
|
jae.energo.kg
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ENERGO.KG" and the NextOwner "ENERGO-ES.kg". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
Zone: www.jae.energo.kg
|
|
www.jae.energo.kg
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ENERGO.KG" and the NextOwner "ENERGO-ES.kg". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|
|
|
|
|
| Bitmap: NS, RRSIG, NSEC Validated: RRSIG-Owner energo.kg., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.12.2024, 23:59:54 +, Signature-Inception: 10.07.2024, 04:00:16 +, KeyTag 3529, Signer-Name: kg
|
|
|
|
|
| Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC confirms the existence of the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC-Records, so DNSSEC works.
|