Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 9799, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2022, 00:00:00 +, Signature-Inception: 11.01.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.01.2022, 05:00:00 +, Signature-Inception: 13.01.2022, 04:00:00 +, KeyTag 9799, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 9799 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 7986, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 54255, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 30.01.2022, 15:22:29 +, Signature-Inception: 09.01.2022, 14:22:29 +, KeyTag 26974, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: keka.org
|
|
keka.org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest I6yHWlW7bYcqrD5EBxiEsAPkNRpK7HUVjfU1r5WUetM=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner keka.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.01.2022, 15:22:29 +, Signature-Inception: 09.01.2022, 14:22:29 +, KeyTag 54255, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 54255 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner keka.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 05.03.2022, 01:03:51 +, Signature-Inception: 03.01.2022, 01:03:51 +, KeyTag 2371, Signer-Name: keka.org
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "I6yHWlW7bYcqrD5EBxiEsAPkNRpK7HUVjfU1r5WUetM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 75.2.60.5
99.83.231.61
Validated: RRSIG-Owner keka.org., Algorithm: 13, 2 Labels, original TTL: 255 sec, Signature-expiration: 14.01.2022, 14:25:11 +, Signature-Inception: 12.01.2022, 12:25:11 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:spf.forwardemail.net include:posteo.de ~all
forward-email=9voptw8i28wnqg0a5w84z24wrlff0pxw9fpccvn2f9vmnjrlud7ohrddsmer@posteo.de
Validated: RRSIG-Owner keka.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:11 +, Signature-Inception: 12.01.2022, 12:25:11 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.keka.org): _443._tcp.keka.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
Validated: RRSIG-Owner _443._tcp.keka.org., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:11 +, Signature-Inception: 12.01.2022, 12:25:11 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|iodefmailto:hostmaster@keka.org
5|issueletsencrypt.org
9|issuewild;
Validated: RRSIG-Owner keka.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:11 +, Signature-Inception: 12.01.2022, 12:25:11 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "keka.org" equal the NSEC-owner "keka.org" and the NextOwner "\000.keka.org". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner keka.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:11 +, Signature-Inception: 12.01.2022, 12:25:11 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "keka.org" equal the NSEC-owner "keka.org" and the NextOwner "\000.keka.org". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner keka.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:11 +, Signature-Inception: 12.01.2022, 12:25:11 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.keka.org
|
|
www.keka.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.keka.org" and the NextOwner "\000.www.keka.org". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 75.2.60.5
Validated: RRSIG-Owner www.keka.org., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.01.2022, 14:25:12 +, Signature-Inception: 12.01.2022, 12:25:12 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 -all
Validated: RRSIG-Owner www.keka.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:12 +, Signature-Inception: 12.01.2022, 12:25:12 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.www.keka.org): _443._tcp.www.keka.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
Validated: RRSIG-Owner _443._tcp.www.keka.org., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:12 +, Signature-Inception: 12.01.2022, 12:25:12 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.keka.org" equal the NSEC-owner "www.keka.org" and the NextOwner "\000.www.keka.org". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner www.keka.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:12 +, Signature-Inception: 12.01.2022, 12:25:12 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.keka.org" equal the NSEC-owner "www.keka.org" and the NextOwner "\000.www.keka.org". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner www.keka.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:12 +, Signature-Inception: 12.01.2022, 12:25:12 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.keka.org" equal the NSEC-owner "www.keka.org" and the NextOwner "\000.www.keka.org". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner www.keka.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.01.2022, 14:25:12 +, Signature-Inception: 12.01.2022, 12:25:12 +, KeyTag 34505, Signer-Name: keka.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|