Check DNS, Urls + Redirects, Certificates and Content of your Website



X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
10.06.2021 17:11:44


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
kube.hw.clm.team

Refused
yes
1
0
www.kube.hw.clm.team

Refused
yes
1
0
kube.hw.clm.team
A
119.8.150.19
Santiago/Santiago Metropolitan/Chile (CL) - Huawei International Pte. LTD
No Hostname found
no


*.hw.clm.team
A

yes



AAAA

yes



CNAME

yes


*.kube.hw.clm.team
A

yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14631, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.07.2021, 00:00:00 +, Signature-Inception: 10.06.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: team
team
2 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 29176, DigestType 1 and Digest RzPmDFX1G0IQ3TP8WBYW7OVjGcQ=



DS with Algorithm 8, KeyTag 29176, DigestType 2 and Digest 4cQK+mx9DAfJwEkBq7lexVSadOdE3hcZjAQQPwX+Fbg=



1 RRSIG RR to validate DS RR found



RRSIG-Owner team., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.06.2021, 05:00:00 +, Signature-Inception: 10.06.2021, 04:00:00 +, KeyTag 14631, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14631 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 1578, Flags 256



Public Key with Algorithm 8, KeyTag 29176, Flags 257 (SEP = Secure Entry Point)



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner team., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.07.2021, 18:12:12 +, Signature-Inception: 06.06.2021, 18:05:19 +, KeyTag 1578, Signer-Name: team



RRSIG-Owner team., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.07.2021, 18:12:12 +, Signature-Inception: 06.06.2021, 18:05:19 +, KeyTag 29176, Signer-Name: team



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 1578 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 29176 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 29176, DigestType 1 and Digest "RzPmDFX1G0IQ3TP8WBYW7OVjGcQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 29176, DigestType 2 and Digest "4cQK+mx9DAfJwEkBq7lexVSadOdE3hcZjAQQPwX+Fbg=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: clm.team
clm.team
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "vf6p2q7uqd8dom4gpafsh74e3c19f9ed" between the hashed NSEC3-owner "veevo0qejhgu9ha3e3m8v7vi12ol0hqm" and the hashed NextOwner "vflsh4eqpign7lcfs2kvmlipn1n11rn4". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner veevo0qejhgu9ha3e3m8v7vi12ol0hqm.team., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 08.07.2021, 10:42:07 +, Signature-Inception: 08.06.2021, 10:11:27 +, KeyTag 1578, Signer-Name: team



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "irv5ols7unjhgkqsnel3nbef2vf1p6k2" as Owner. That's the Hash of "team" with the NextHashedOwnerName "iscsmqjnqd97kfp01u3i8mrv6k1o75um". So that domain name is the Closest Encloser of "clm.team". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner irv5ols7unjhgkqsnel3nbef2vf1p6k2.team., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 05.07.2021, 00:31:14 +, Signature-Inception: 05.06.2021, 00:31:10 +, KeyTag 1578, Signer-Name: team



2 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 34505, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner clm.team., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 30.06.2021, 20:21:22 +, Signature-Inception: 01.05.2021, 20:21:22 +, KeyTag 2371, Signer-Name: clm.team



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet



Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.

Zone: hw.clm.team
hw.clm.team
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "hw.clm.team" and the NextOwner "hw\000.clm.team". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC



0 DNSKEY RR found




Zone: kube.hw.clm.team
kube.hw.clm.team
0 DS RR in the parent zone found

Zone: www.kube.hw.clm.team
www.kube.hw.clm.team
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
hw.clm.team
  ns1.huaweicloud-dns.net


  ns1.huaweicloud-dns.org
14.137.153.1
Tokyo/Japan (JP) - Huawei International Pte. Ltd.


 
159.138.17.59
Guangzhou/Guangdong/China (CN) - Huawei International Pte. Ltd.


 
159.138.77.159
Tampines New Town//Singapore (SG) - Huawei International Pte. Ltd.

clm.team
  raquel.ns.cloudflare.com / 67m35
108.162.194.210
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
162.159.38.210
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
172.64.34.210
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
2606:4700:50::a29f:26d2
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c2d2
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:22d2
London/England/United Kingdom (GB) - CloudFLARENET-EU


  wesley.ns.cloudflare.com / 67m22
108.162.193.246
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
172.64.33.246
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
173.245.59.246
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
2606:4700:58::adf5:3bf6
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c1f6
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:21f6
London/England/United Kingdom (GB) - CloudFLARENET-EU

team
  demand.alpha.aridns.net.au / dns3.frpar1


  demand.beta.aridns.net.au / dns1.defra1


  demand.delta.aridns.net.au / dns4.frpar1


  demand.gamma.aridns.net.au / dns2.defra1


4. SOA-Entries


Domain:team
Zone-Name:team
Primary:demand.alpha.aridns.net.au
Mail:hostmaster.donuts.co
Serial:1623337407
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:4


Domain:clm.team
Zone-Name:clm.team
Primary:raquel.ns.cloudflare.com
Mail:dns.cloudflare.com
Serial:2037500406
Refresh:10000
Retry:2400
Expire:604800
TTL:3600
num Entries:12


Domain:hw.clm.team
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:4


5. Screenshots

Startaddress: https://kube.hw.clm.team, address used: https://kube.hw.clm.team/login, Screenshot created 2021-06-10 17:13:54 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

2990 milliseconds

Screenshot mobile - https://kube.hw.clm.team/login
Mobil + Landscape (732px x 412px)

2547 milliseconds

Screenshot mobile landscape - https://kube.hw.clm.team/login
Screen (1280px x 1680px)

8357 milliseconds

Screenshot Desktop - https://kube.hw.clm.team/login

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_256_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://kube.hw.clm.team/
119.8.150.19
308
https://kube.hw.clm.team
Html is minified: 109.33 %
0.433
A
Date: Thu, 10 Jun 2021 15:12:56 GMT
Content-Type: text/html
Content-Length: 164
Connection: close
Location: https://kube.hw.clm.team

• https://kube.hw.clm.team/
119.8.150.19 GZip used - 1606 / 8644 - 81.42 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
4.750
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Thu, 10 Jun 2021 15:12:57 GMT
Content-Type: application/json
Content-Length: 1606
Connection: close
Content-Encoding: gzip
Expires: Wed 24 Feb 1982 18:42:00 GMT
X-Api-Schemas: https://kube.hw.clm.team/meta/schemas
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=15724800; includeSubDomains

• https://kube.hw.clm.team
GZip used - 1606 / 8644 - 81.42 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
5.977
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Thu, 10 Jun 2021 15:13:10 GMT
Content-Type: application/json
Content-Length: 1606
Connection: close
Content-Encoding: gzip
Expires: Wed 24 Feb 1982 18:42:00 GMT
X-Api-Schemas: https://kube.hw.clm.team/meta/schemas
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=15724800; includeSubDomains

• http://kube.hw.clm.team/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
119.8.150.19
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
308
https://kube.hw.clm.team/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.33 %
0.423
A
Visible Content: 308 Permanent Redirect nginx
Date: Thu, 10 Jun 2021 15:13:02 GMT
Content-Type: text/html
Content-Length: 164
Connection: close
Location: https://kube.hw.clm.team/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• https://kube.hw.clm.team/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
4.534
N
Not Found
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Visible Content: 404 page not found
Date: Thu, 10 Jun 2021 15:13:15 GMT
Content-Type: text/plain; charset=utf-8
Content-Length: 19
Connection: close
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=15724800; includeSubDomains

• https://119.8.150.19/
119.8.150.19
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 110.61 %
4.746
N
Not Found
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 19)
404 Not Found nginx
Date: Thu, 10 Jun 2021 15:13:03 GMT
Content-Type: text/html
Content-Length: 146
Connection: close
Strict-Transport-Security: max-age=15724800; includeSubDomains

7. Comments


1. General Results, most used to calculate the result

Aname "kube.hw.clm.team" is subdomain, public suffix is ".team", top-level-domain is ".team", top-level-domain-type is "generic", tld-manager is "Binky Moon, LLC", num .team-domains preloaded: 34 (complete: 151507)
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
Agood: destination is https
AGood: No cookie sent via http.
Agood: every https has a Strict Transport Security Header
Agood: HSTS has includeSubdomains - directive
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (4 urls)
https://kube.hw.clm.team


Url with incomplete Content-Type - header - missing charset
https://kube.hw.clm.team/ 119.8.150.19


Url with incomplete Content-Type - header - missing charset
https://119.8.150.19/ 119.8.150.19


Url with incomplete Content-Type - header - missing charset
Bwarning: HSTS max-age is too short - minimum 31536000 = 365 days required, 15724800 seconds = 182 days found
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
Chttps://kube.hw.clm.team/ 119.8.150.19

https://kube.hw.clm.team
Error - redirect destination with a missing / at the end found. So two http status 200 results, only difference: An ending /. Perhaps missing "/" in the redirect rule. May be a problem redirecting folders and files.
Mhttps://119.8.150.19/ 119.8.150.19
404

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://kube.hw.clm.team
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://kube.hw.clm.team/ 119.8.150.19
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://kube.hw.clm.team/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://119.8.150.19/ 119.8.150.19
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
XFatal error: Nameserver doesn't support TCP connection: ns1.huaweicloud-dns.net: Refused
XFatal error: Nameserver doesn't support TCP connection: ns1.huaweicloud-dns.org / 14.137.153.1: Refused

2. DNS- and NameServer - Checks

AInfo:: 7 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 7 Queries complete, 7 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: raquel.ns.cloudflare.com, wesley.ns.cloudflare.com, 2 Name Servers included in Delegation: raquel.ns.cloudflare.com, wesley.ns.cloudflare.com, 2 Name Servers included in 1 Zone definitions: raquel.ns.cloudflare.com, wesley.ns.cloudflare.com, 1 Name Servers listed in SOA.Primary: raquel.ns.cloudflare.com.
AGood: Only one SOA.Primary Name Server found.: raquel.ns.cloudflare.com.
AGood: SOA.Primary Name Server included in the delegation set.: raquel.ns.cloudflare.com.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 6 Name Servers, 4 different subnets (first Byte): 108., 162., 172., 173., 4 different subnets (first two Bytes): 108.162., 162.159., 172.64., 173.245., 6 different subnets (first three Bytes): 108.162.193., 108.162.194., 162.159.38., 172.64.33., 172.64.34., 173.245.59.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 6 Name Servers with IPv6, 3 different subnets (first block): 2606:, 2803:, 2a06:, 3 different subnets (first two blocks): 2606:4700:, 2803:f800:, 2a06:98c1:, 4 different subnets (first three blocks): 2606:4700:0050:, 2606:4700:0058:, 2803:f800:0050:, 2a06:98c1:0050:, 4 different subnets (first four blocks): 2606:4700:0050:0000:, 2606:4700:0058:0000:, 2803:f800:0050:0000:, 2a06:98c1:0050:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.huaweicloud-dns.net: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.huaweicloud-dns.org / 14.137.153.1: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.huaweicloud-dns.org / 159.138.17.59: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.huaweicloud-dns.org / 159.138.77.159: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: SOA NOT expected and NOT found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 supports GZip.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://kube.hw.clm.team/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
4.534 seconds
Warning: 404 needs more then one second
https://119.8.150.19/ 119.8.150.19
404
4.746 seconds
Warning: 404 needs more then one second
ADuration: 134874 milliseconds, 134.874 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
kube.hw.clm.team
kube.hw.clm.team
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
kube.hw.clm.team
kube.hw.clm.team
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=Kubernetes Ingress Controller Fake Certificate, O=Acme Co


kube.hw.clm.team
119.8.150.19
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

kube.hw.clm.team
119.8.150.19
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=Kubernetes Ingress Controller Fake Certificate, O=Acme Co


119.8.150.19
119.8.150.19
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

119.8.150.19
119.8.150.19
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=Kubernetes Ingress Controller Fake Certificate, O=Acme Co


9. Certificates

1.
1.
CN=Kubernetes Ingress Controller Fake Certificate, O=Acme Co
10.06.2021
10.06.2022
expires in 352 days
ingress.local - 1 entry
1.
1.
CN=Kubernetes Ingress Controller Fake Certificate, O=Acme Co
10.06.2021

10.06.2022
expires in 352 days
ingress.local - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00AAA4F0A7DCEB1E551EFE87C918645888
Thumbprint:AE58F8D58E3E8B40B78F3135EC1EE00CA844E0BE
SHA256 / Certificate:QbO75Z4ORsSlBujr9BxdLVnARfzECRlaP068Fb4e7fc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):2dbb90f57a55142aa366bbba9d5c5a73f3f0e43642d363aa1589fc216610e466
SHA256 hex / Subject Public Key Information (SPKI):5440f94a3e69e8f0eb2a00ad05af1f3fa0b32ab2671aff290bac76ee7266e8c4
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1)

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
4
4

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2616423421
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-06-10 03:36:37
2021-09-08 03:36:36
kube.hw.clm.team - 1 entries


2615984140
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-06-09 23:58:10
2021-09-07 23:58:09
kube.hw.clm.team - 1 entries


2615878440
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-06-09 23:05:38
2021-09-07 23:05:37
kube.hw.clm.team - 1 entries


2615549755
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-06-09 20:14:46
2021-09-07 20:14:45
kube.hw.clm.team - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
4
4

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4676330687
precert
CN=R3, O=Let's Encrypt, C=US
2021-06-10 01:36:37
2021-09-08 01:36:36
kube.hw.clm.team
1 entries


4675531891
precert
CN=R3, O=Let's Encrypt, C=US
2021-06-09 21:58:10
2021-09-07 21:58:09
kube.hw.clm.team
1 entries


4675333335
precert
CN=R3, O=Let's Encrypt, C=US
2021-06-09 21:05:38
2021-09-07 21:05:37
kube.hw.clm.team
1 entries


4674728700
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-06-09 18:14:46
2021-09-07 18:14:45
kube.hw.clm.team
1 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: raquel.ns.cloudflare.com, wesley.ns.cloudflare.com

QNr.DomainTypeNS used
1
com
NS
l.root-servers.net (2001:500:9f::42)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
raquel.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
3
wesley.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
4
raquel.ns.cloudflare.com: 108.162.194.210, 162.159.38.210, 172.64.34.210
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
5
raquel.ns.cloudflare.com: 2606:4700:50::a29f:26d2, 2803:f800:50::6ca2:c2d2, 2a06:98c1:50::ac40:22d2
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
6
wesley.ns.cloudflare.com: 108.162.193.246, 172.64.33.246, 173.245.59.246
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
7
wesley.ns.cloudflare.com: 2606:4700:58::adf5:3bf6, 2803:f800:50::6ca2:c1f6, 2a06:98c1:50::ac40:21f6
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
hw.clm.team
-5

Refused - The name server refuses to perform the specified operation for policy reasons
1
0
clm.team
0

no CAA entry found
1
0
team
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
hw.clm.team

Refused - The name server refuses to perform the specified operation for policy reasons
1
0
_acme-challenge.kube.hw.clm.team.hw.clm.team

Refused - The name server refuses to perform the specified operation for policy reasons
1
0


15. Portchecks

No Port checks



Permalink: https://check-your-website.server-daten.de/?i=77343748-ced5-409f-8711-76d92a0011aa


Last Result: https://check-your-website.server-daten.de/?q=kube.hw.clm.team - 2021-06-10 17:11:44


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=kube.hw.clm.team" target="_blank">Check this Site: kube.hw.clm.team</a>