Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14631, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26838, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.07.2021, 00:00:00 +, Signature-Inception: 20.06.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: dev
|
|
dev
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 60074, DigestType 2 and Digest uULizlrr9i/KWdBXB+bbt5UhHVQNitugLp6J6DNCR4U=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner dev., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 03.07.2021, 17:00:00 +, Signature-Inception: 20.06.2021, 16:00:00 +, KeyTag 14631, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14631 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 48574, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 60074, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner dev., Algorithm: 8, 1 Labels, original TTL: 300 sec, Signature-expiration: 08.07.2021, 15:19:06 +, Signature-Inception: 16.06.2021, 15:19:06 +, KeyTag 60074, Signer-Name: dev
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 60074 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 60074, DigestType 2 and Digest "uULizlrr9i/KWdBXB+bbt5UhHVQNitugLp6J6DNCR4U=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: nightquest.dev
|
|
nightquest.dev
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 28390, DigestType 2 and Digest HeVFnY2FIR+v/k9nZBRSYMXbJgv/A0vgoAkxnxDkzRA=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner nightquest.dev., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.07.2021, 15:19:06 +, Signature-Inception: 16.06.2021, 15:19:06 +, KeyTag 48574, Signer-Name: dev
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 48574 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 28390, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 57379, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner nightquest.dev., Algorithm: 8, 2 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 28390, Signer-Name: nightquest.dev
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 28390 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 28390, DigestType 2 and Digest "HeVFnY2FIR+v/k9nZBRSYMXbJgv/A0vgoAkxnxDkzRA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 73.159.106.131
Validated: RRSIG-Owner nightquest.dev., Algorithm: 8, 2 Labels, original TTL: 60 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "cdjpoj0olt2gqoooaaoojldaeo1m75s3" equal the hashed NSEC3-owner "cdjpoj0olt2gqoooaaoojldaeo1m75s3" and the hashed NextOwner "p2f4pcof1cd0k96bn3po90ab3scm0r8n". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS Validated: RRSIG-Owner cdjpoj0olt2gqoooaaoojldaeo1m75s3.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "cdjpoj0olt2gqoooaaoojldaeo1m75s3" equal the hashed NSEC3-owner "cdjpoj0olt2gqoooaaoojldaeo1m75s3" and the hashed NextOwner "p2f4pcof1cd0k96bn3po90ab3scm0r8n". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS Validated: RRSIG-Owner cdjpoj0olt2gqoooaaoojldaeo1m75s3.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "cdjpoj0olt2gqoooaaoojldaeo1m75s3" equal the hashed NSEC3-owner "cdjpoj0olt2gqoooaaoojldaeo1m75s3" and the hashed NextOwner "p2f4pcof1cd0k96bn3po90ab3scm0r8n". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS Validated: RRSIG-Owner cdjpoj0olt2gqoooaaoojldaeo1m75s3.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.nightquest.dev) sends a valid NSEC3 RR as result with the hashed owner name "cdjpoj0olt2gqoooaaoojldaeo1m75s3" (unhashed: nightquest.dev). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS Validated: RRSIG-Owner cdjpoj0olt2gqoooaaoojldaeo1m75s3.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "86bdf61tsp787v05ruh02ib5t76dg9kr" (unhashed: _tcp.nightquest.dev) with the owner "5ud3ohks9c5ualn3rvdpca7ius0m9n6d" and the NextOwner "apcop2moshsq424h6l9rl7uus8kk4dc2". So that NSEC3 confirms the not-existence of the Next Closer Name. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "aaais4cmjvgu60420jjrs642qdult00s" (unhashed: *.nightquest.dev) with the owner "5ud3ohks9c5ualn3rvdpca7ius0m9n6d" and the NextOwner "apcop2moshsq424h6l9rl7uus8kk4dc2". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 5ud3ohks9c5ualn3rvdpca7ius0m9n6d.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "cdjpoj0olt2gqoooaaoojldaeo1m75s3" equal the hashed NSEC3-owner "cdjpoj0olt2gqoooaaoojldaeo1m75s3" and the hashed NextOwner "p2f4pcof1cd0k96bn3po90ab3scm0r8n". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS Validated: RRSIG-Owner cdjpoj0olt2gqoooaaoojldaeo1m75s3.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.nightquest.dev
|
|
www.nightquest.dev
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 73.159.106.131
Validated: RRSIG-Owner www.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "p2f4pcof1cd0k96bn3po90ab3scm0r8n" equal the hashed NSEC3-owner "p2f4pcof1cd0k96bn3po90ab3scm0r8n" and the hashed NextOwner "19odc4qe7i4odhljqetjt8e66s6vi0u8". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner p2f4pcof1cd0k96bn3po90ab3scm0r8n.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "p2f4pcof1cd0k96bn3po90ab3scm0r8n" equal the hashed NSEC3-owner "p2f4pcof1cd0k96bn3po90ab3scm0r8n" and the hashed NextOwner "19odc4qe7i4odhljqetjt8e66s6vi0u8". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner p2f4pcof1cd0k96bn3po90ab3scm0r8n.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "p2f4pcof1cd0k96bn3po90ab3scm0r8n" equal the hashed NSEC3-owner "p2f4pcof1cd0k96bn3po90ab3scm0r8n" and the hashed NextOwner "19odc4qe7i4odhljqetjt8e66s6vi0u8". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner p2f4pcof1cd0k96bn3po90ab3scm0r8n.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.nightquest.dev) sends a valid NSEC3 RR as result with the hashed owner name "p2f4pcof1cd0k96bn3po90ab3scm0r8n" (unhashed: www.nightquest.dev). So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "u3f4dqdi54g2cvrkvr6hne57ihjqvmb5" (unhashed: _tcp.www.nightquest.dev) with the owner "p2f4pcof1cd0k96bn3po90ab3scm0r8n" and the NextOwner "19odc4qe7i4odhljqetjt8e66s6vi0u8". So that NSEC3 confirms the not-existence of the Next Closer Name. TLSA-Query (_443._tcp.www.nightquest.dev) sends a valid NSEC3 RR as result with the owner name "p2f4pcof1cd0k96bn3po90ab3scm0r8n" greater the NextOwner-Name "19odc4qe7i4odhljqetjt8e66s6vi0u8", so the NSEC3 covers the end of the zone. The hashed query name "0kqkq5ms9od14l7co4e4j2jekem6busg" comes before the hashed NextOwner, so the zone confirmes the not-existence of that TLSA RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner p2f4pcof1cd0k96bn3po90ab3scm0r8n.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "7j8obics7cr6tmk4g7ml6p20e8ktra6b" (unhashed: *.www.nightquest.dev) with the owner "5ud3ohks9c5ualn3rvdpca7ius0m9n6d" and the NextOwner "apcop2moshsq424h6l9rl7uus8kk4dc2". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 5ud3ohks9c5ualn3rvdpca7ius0m9n6d.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "p2f4pcof1cd0k96bn3po90ab3scm0r8n" equal the hashed NSEC3-owner "p2f4pcof1cd0k96bn3po90ab3scm0r8n" and the hashed NextOwner "19odc4qe7i4odhljqetjt8e66s6vi0u8". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner p2f4pcof1cd0k96bn3po90ab3scm0r8n.nightquest.dev., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 10.07.2021, 20:18:14 +, Signature-Inception: 18.06.2021, 20:18:14 +, KeyTag 57379, Signer-Name: nightquest.dev
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|