Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.07.2019, 00:00:00 +, Signature-Inception: 10.06.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 2 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 29.06.2019, 17:00:00 +, Signature-Inception: 16.06.2019, 16:00:00 +, KeyTag 25266, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 9795, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 17883, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 33932, Flags 256
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 50465, Flags 256
|
|
|
|
|
| 3 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 7, 1 Labels, original TTL: 900 sec, Signature-expiration: 30.06.2019, 15:30:14 +, Signature-Inception: 09.06.2019, 14:30:14 +, KeyTag 9795, Signer-Name: org
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 7, 1 Labels, original TTL: 900 sec, Signature-expiration: 30.06.2019, 15:30:14 +, Signature-Inception: 09.06.2019, 14:30:14 +, KeyTag 17883, Signer-Name: org
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 7, 1 Labels, original TTL: 900 sec, Signature-expiration: 30.06.2019, 15:30:14 +, Signature-Inception: 09.06.2019, 14:30:14 +, KeyTag 50465, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 9795 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 17883 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 50465 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 9795, DigestType 1 and Digest "Nk36s9ryVMq0d7VnWxB2bdqiSYI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 9795, DigestType 2 and Digest "OSKzG286TqkrGet7UhIPAx/Y4F/wsDuvz5+JG/5/+OU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: noblemail.org
|
|
noblemail.org
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner noblemail.org., Algorithm: 7, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.06.2019, 15:30:14 +, Signature-Inception: 09.06.2019, 14:30:14 +, KeyTag 50465, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 50465 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 1628, Flags 256
|
|
|
|
|
| Public Key with Algorithm 7, KeyTag 10461, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner noblemail.org., Algorithm: 7, 2 Labels, original TTL: 1800 sec, Signature-expiration: 16.07.2019, 00:00:00 +, Signature-Inception: 16.06.2019, 01:00:49 +, KeyTag 10461, Signer-Name: noblemail.org
|
|
|
|
|
| • Status: Good - Algorithmus 7 and DNSKEY with KeyTag 10461 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 10461, DigestType 2 and Digest "VKbbTWxbPGSagRSn2vNwInCysj0Y2Z3AR3PXrBX8Yj4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: mail.noblemail.org
|
|
mail.noblemail.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "gbldrfg2hb0pnrculnn424ifr284epkd" between the hashed NSEC3-owner "gbldrfg2hb0pnrculnn424ifr284epkd" and the hashed NextOwner "glrm4v3k2pdsdq7qhavj7cqtnrdofuli". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, MX, TXT, SSHFP, RRSIG Validated: RRSIG-Owner gbldrfg2hb0pnrculnn424ifr284epkd.noblemail.org., Algorithm: 7, 3 Labels, original TTL: 1800 sec, Signature-expiration: 16.07.2019, 00:00:00 +, Signature-Inception: 16.06.2019, 01:00:49 +, KeyTag 1628, Signer-Name: noblemail.org
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 149.28.199.145
Validated: RRSIG-Owner mail.noblemail.org., Algorithm: 7, 3 Labels, original TTL: 1800 sec, Signature-expiration: 16.07.2019, 00:00:00 +, Signature-Inception: 16.06.2019, 01:00:49 +, KeyTag 1628, Signer-Name: noblemail.org
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 mx -all
Validated: RRSIG-Owner mail.noblemail.org., Algorithm: 7, 3 Labels, original TTL: 1800 sec, Signature-expiration: 16.07.2019, 00:00:00 +, Signature-Inception: 16.06.2019, 01:00:49 +, KeyTag 1628, Signer-Name: noblemail.org
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.mail.noblemail.org): _443._tcp.mail.noblemail.org: CertUsage 3 (DANE-EE, Domain-issued certificate), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 4ee67315c685e3b6bca8e27d96ebd1a2b052cf6f0366de2eacaae75969d62cb5
Validated: RRSIG-Owner _443._tcp.mail.noblemail.org., Algorithm: 7, 5 Labels, original TTL: 1800 sec, Signature-expiration: 16.07.2019, 00:00:00 +, Signature-Inception: 16.06.2019, 01:00:49 +, KeyTag 1628, Signer-Name: noblemail.org
|
|
|
|
|
| RRSIG Type 50, expiration 2019-07-16 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, MX, TXT, SSHFP, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-07-16 00:00:00 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, MX, TXT, SSHFP, RRSIG
|
|
|
|
|
| RRSIG Type 50, expiration 2019-07-16 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, MX, TXT, SSHFP, RRSIG
|
|
|
Zone: www.mail.noblemail.org
|
|
www.mail.noblemail.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "9ks3ecssnoq8093905ipca1fc6m8dfa9" between the hashed NSEC3-owner "8ri8c4heujv7jqugue9tfjntofabntdd" and the hashed NextOwner "9n317fetlflfdmeihka1cd9m8m7mai6s". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: TXT, RRSIG Validated: RRSIG-Owner 8ri8c4heujv7jqugue9tfjntofabntdd.noblemail.org., Algorithm: 7, 3 Labels, original TTL: 1800 sec, Signature-expiration: 16.07.2019, 00:00:00 +, Signature-Inception: 16.06.2019, 01:00:49 +, KeyTag 1628, Signer-Name: noblemail.org
|