| Zone (*) | DNSSEC - Informations |
|---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26116, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.11.2020, 00:00:00 +, Signature-Inception: 21.10.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: nl
|
|
nl
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 34112, DigestType 2 and Digest PFtfmzVXRVxQdRqb6evpI4yI4Z9fB/kwl2kXtRuVzSI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 12.11.2020, 05:00:00 +, Signature-Inception: 30.10.2020, 04:00:00 +, KeyTag 26116, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26116 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25290, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34112, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 06.11.2020, 18:18:42 +, Signature-Inception: 24.10.2020, 04:10:09 +, KeyTag 34112, Signer-Name: nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34112 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34112, DigestType 2 and Digest "PFtfmzVXRVxQdRqb6evpI4yI4Z9fB/kwl2kXtRuVzSI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: mhm.nl
|
|
mhm.nl
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 52591, DigestType 2 and Digest vZIA1v2+sHcSxt4+WEohtvh4eV+y2IXVQ6FFbM0Fcwo=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner mhm.nl., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 14:56:26 +, Signature-Inception: 29.10.2020, 22:10:09 +, KeyTag 25290, Signer-Name: nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25290 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 28965, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 43971, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 52591, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner mhm.nl., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 52591, Signer-Name: mhm.nl
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 52591 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 52591, DigestType 2 and Digest "vZIA1v2+sHcSxt4+WEohtvh4eV+y2IXVQ6FFbM0Fcwo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 136.144.212.208
Validated: RRSIG-Owner mhm.nl., Algorithm: 8, 2 Labels, original TTL: 900 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: MS=ms40166193
v=spf1 +a include:spf.protection.outlook.com -all
Validated: RRSIG-Owner mhm.nl., Algorithm: 8, 2 Labels, original TTL: 900 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "5g43dp0lr4j82mocq155r87f5c4snv96" equal the hashed NSEC3-owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the hashed NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 5g43dp0lr4j82mocq155r87f5c4snv96.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "5g43dp0lr4j82mocq155r87f5c4snv96" equal the hashed NSEC3-owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the hashed NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 5g43dp0lr4j82mocq155r87f5c4snv96.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.mhm.nl) sends a valid NSEC3 RR as result with the hashed owner name "n3s095es5ge7var1st63u0i93o6pvifq" (unhashed: _tcp.mhm.nl). So that's the Closest Encloser of the query name.
Bitmap: No Bitmap? Validated: RRSIG-Owner n3s095es5ge7var1st63u0i93o6pvifq.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "6b4ng0t35ijsgjbgdf4okc8sbd9nsacr" (unhashed: *._tcp.mhm.nl) with the owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So that NSEC3 confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.mhm.nl) sends a valid NSEC3 RR as result with the hashed query name "k6cm2qa54a0ttonbohd3roee1sjmnkuu" between the hashed NSEC3-owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the hashed NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 5g43dp0lr4j82mocq155r87f5c4snv96.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "5g43dp0lr4j82mocq155r87f5c4snv96" equal the hashed NSEC3-owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the hashed NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 5g43dp0lr4j82mocq155r87f5c4snv96.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.mhm.nl
|
|
www.mhm.nl
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "l2dlitpvp6pknfguvg32jf1iv26ldjoa" between the hashed NSEC3-owner "l2dlitpvp6pknfguvg32jf1iv26ldjoa" and the hashed NextOwner "lnbt3h77a2u8nave8m7cqk2clvtm4bu1". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner l2dlitpvp6pknfguvg32jf1iv26ldjoa.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 136.144.212.208
Validated: RRSIG-Owner www.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 900 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "l2dlitpvp6pknfguvg32jf1iv26ldjoa" equal the hashed NSEC3-owner "l2dlitpvp6pknfguvg32jf1iv26ldjoa" and the hashed NextOwner "lnbt3h77a2u8nave8m7cqk2clvtm4bu1". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner l2dlitpvp6pknfguvg32jf1iv26ldjoa.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "l2dlitpvp6pknfguvg32jf1iv26ldjoa" equal the hashed NSEC3-owner "l2dlitpvp6pknfguvg32jf1iv26ldjoa" and the hashed NextOwner "lnbt3h77a2u8nave8m7cqk2clvtm4bu1". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner l2dlitpvp6pknfguvg32jf1iv26ldjoa.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "l2dlitpvp6pknfguvg32jf1iv26ldjoa" equal the hashed NSEC3-owner "l2dlitpvp6pknfguvg32jf1iv26ldjoa" and the hashed NextOwner "lnbt3h77a2u8nave8m7cqk2clvtm4bu1". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner l2dlitpvp6pknfguvg32jf1iv26ldjoa.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.mhm.nl) sends a valid NSEC3 RR as result with the hashed owner name "l2dlitpvp6pknfguvg32jf1iv26ldjoa" (unhashed: www.mhm.nl). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner l2dlitpvp6pknfguvg32jf1iv26ldjoa.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "5rg062l651pd3n7emuquc3stoqdievfn" (unhashed: _tcp.www.mhm.nl) with the owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So that NSEC3 confirms the not-existence of the Next Closer Name. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "k185bmotima71s8revj740agp4g45f8o" (unhashed: *.www.mhm.nl) with the owner "5g43dp0lr4j82mocq155r87f5c4snv96" and the NextOwner "l2dlitpvp6pknfguvg32jf1iv26ldjoa". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 5g43dp0lr4j82mocq155r87f5c4snv96.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "l2dlitpvp6pknfguvg32jf1iv26ldjoa" equal the hashed NSEC3-owner "l2dlitpvp6pknfguvg32jf1iv26ldjoa" and the hashed NextOwner "lnbt3h77a2u8nave8m7cqk2clvtm4bu1". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner l2dlitpvp6pknfguvg32jf1iv26ldjoa.mhm.nl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 12.11.2020, 00:00:00 +, Signature-Inception: 22.10.2020, 00:00:00 +, KeyTag 43971, Signer-Name: mhm.nl
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|