Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26470, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.02.2025, 00:00:00 +, Signature-Inception: 31.01.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: dk
|
|
dk
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2181, DigestType 2 and Digest nnB7jJqK5Ik/bd9UWVf5gJ/oukdHv3BSY2AUZqoQBR0=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner dk., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 17.02.2025, 05:00:00 +, Signature-Inception: 04.02.2025, 04:00:00 +, KeyTag 26470, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26470 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2181, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 30862, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner dk., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 03.03.2025, 04:38:39 +, Signature-Inception: 03.02.2025, 03:08:39 +, KeyTag 2181, Signer-Name: dk
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2181 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2181, DigestType 2 and Digest "nnB7jJqK5Ik/bd9UWVf5gJ/oukdHv3BSY2AUZqoQBR0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: web-access.dk
|
|
web-access.dk
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 12334, DigestType 4 and Digest Acdyo1YJYnQRCG90f+X0PN7puHQfcAUMwve2JvsI2Hz4j+F3J4TEBWldKfQLjoux
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner web-access.dk., Algorithm: 13, 2 Labels, original TTL: 7200 sec, Signature-expiration: 02.03.2025, 03:38:39 +, Signature-Inception: 02.02.2025, 02:08:39 +, KeyTag 30862, Signer-Name: dk
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 30862 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 12334, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner web-access.dk., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 12334 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 12334, DigestType 4 and Digest "Acdyo1YJYnQRCG90f+X0PN7puHQfcAUMwve2JvsI2Hz4j+F3J4TEBWldKfQLjoux" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: jemfix.web-access.dk
|
|
jemfix.web-access.dk
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "qp2bld52cu303aqhd019n0jicd6ag5tv" between the hashed NSEC3-owner "qp2bld52cu303aqhd019n0jicd6ag5tv" and the hashed NextOwner "sph9qlmiai1m64ksj8jpq27o7c98skgm". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 128.77.255.45
Validated: RRSIG-Owner jemfix.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "qp2bld52cu303aqhd019n0jicd6ag5tv" equal the hashed NSEC3-owner "qp2bld52cu303aqhd019n0jicd6ag5tv" and the hashed NextOwner "sph9qlmiai1m64ksj8jpq27o7c98skgm". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "qp2bld52cu303aqhd019n0jicd6ag5tv" equal the hashed NSEC3-owner "qp2bld52cu303aqhd019n0jicd6ag5tv" and the hashed NextOwner "sph9qlmiai1m64ksj8jpq27o7c98skgm". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "qp2bld52cu303aqhd019n0jicd6ag5tv" equal the hashed NSEC3-owner "qp2bld52cu303aqhd019n0jicd6ag5tv" and the hashed NextOwner "sph9qlmiai1m64ksj8jpq27o7c98skgm". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.jemfix.web-access.dk) sends a valid NSEC3 RR as result with the hashed owner name "qp2bld52cu303aqhd019n0jicd6ag5tv" (unhashed: jemfix.web-access.dk). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "ens7d5aspb1sglgt4cl6q88r12kfq82q" (unhashed: _tcp.jemfix.web-access.dk) with the owner "c0ign4mkorr4pm412gf5erocrteglqmf" and the NextOwner "fdch7ql366q1ap7nfasldu1l63rf8hs7". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: A, RRSIG Validated: RRSIG-Owner c0ign4mkorr4pm412gf5erocrteglqmf.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "pt1hq810icr79o0gkh2mdtrjjgrs9pk8" (unhashed: *.jemfix.web-access.dk) with the owner "lacdegcjns2er6v1hkd03bf4fff1heko" and the NextOwner "qp2bld52cu303aqhd019n0jicd6ag5tv". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner lacdegcjns2er6v1hkd03bf4fff1heko.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "qp2bld52cu303aqhd019n0jicd6ag5tv" equal the hashed NSEC3-owner "qp2bld52cu303aqhd019n0jicd6ag5tv" and the hashed NextOwner "sph9qlmiai1m64ksj8jpq27o7c98skgm". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.jemfix.web-access.dk
|
|
www.jemfix.web-access.dk
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "6ivgku8utr5245gfh8emnktqtcqto460" between the hashed NSEC3-owner "5rjjpk0t6el7pehj1o3sfcj4jqhgpodk" and the hashed NextOwner "6k3a00mgf8sudlpfhpom7m074bnt04cf". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 5rjjpk0t6el7pehj1o3sfcj4jqhgpodk.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| DS-Query in the parent zone sends valid NSEC3 RR with the Hash "qp2bld52cu303aqhd019n0jicd6ag5tv" as Owner. That's the Hash of "jemfix.web-access.dk" with the NextHashedOwnerName "sph9qlmiai1m64ksj8jpq27o7c98skgm". So that domain name is the Closest Encloser of "www.jemfix.web-access.dk". Opt-Out: False.
Bitmap: A, RRSIG Validated: RRSIG-Owner qp2bld52cu303aqhd019n0jicd6ag5tv.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|
|
|
|
|
| The ClosestEncloser says, that "*.jemfix.web-access.dk" with the Hash "pt1hq810icr79o0gkh2mdtrjjgrs9pk8" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "lacdegcjns2er6v1hkd03bf4fff1heko" and the Next Owner "qp2bld52cu303aqhd019n0jicd6ag5tv", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner lacdegcjns2er6v1hkd03bf4fff1heko.web-access.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 13.02.2025, 00:00:00 +, Signature-Inception: 23.01.2025, 00:00:00 +, KeyTag 12334, Signer-Name: web-access.dk
|