Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 61050, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.11.2024, 00:00:00 +, Signature-Inception: 21.10.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 12.11.2024, 20:00:00 +, Signature-Inception: 30.10.2024, 19:00:00 +, KeyTag 61050, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 61050 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 19718, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 29942, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.11.2024, 14:02:35 +, Signature-Inception: 24.10.2024, 13:57:35 +, KeyTag 19718, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 19718 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest "isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: mcomdc.com
|
|
mcomdc.com
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 55102, DigestType 1 and Digest fH42kL72wvkPsgryW9ubaFTtK4Y=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 55102, DigestType 2 and Digest 6fn6oRytgIb/TeigrrM/BPuX/1Vj8CtgrXLLzfPo9J4=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 05.11.2024, 00:31:07 +, Signature-Inception: 28.10.2024, 23:21:07 +, KeyTag 29942, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 29942 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 55102, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 55712, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55102, Signer-Name: mcomdc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 55102 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 55102, DigestType 1 and Digest "fH42kL72wvkPsgryW9ubaFTtK4Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 55102, DigestType 2 and Digest "6fn6oRytgIb/TeigrrM/BPuX/1Vj8CtgrXLLzfPo9J4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ns1.mcomdc.com
|
|
ns1.mcomdc.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "*.mcomdc.com" and the NextOwner "-.mcomdc.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: TXT, RRSIG, NSEC
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 -all. RRSIG Owner has 3 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner ns1.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the query name "ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that A RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner ~.ns0~.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that CNAME RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner ~.ns0~.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that TXT RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner ~.ns0~.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that AAAA RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner ~.ns0~.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "_443._tcp.ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.ns1.mcomdc.com) sends a valid NSEC RR as result with the query name "_443._tcp.ns1.mcomdc.com" between the NSEC-owner "_442~._tcp.ns1.mcomdc.com" and the NextOwner "_443!._tcp.ns1.mcomdc.com". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _442~._tcp.ns1.mcomdc.com., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that CAA RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner ~.ns0~.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.ns1.mcomdc.com
|
|
www.ns1.mcomdc.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "*.mcomdc.com" and the NextOwner "-.mcomdc.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: TXT, RRSIG, NSEC
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "wwv~.ns1.mcomdc.com" and the NextOwner "www!.ns1.mcomdc.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 -all. RRSIG Owner has 4 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner www.ns1.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "www.ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the query name "www.ns1.mcomdc.com" between the NSEC-owner "wwv~.ns1.mcomdc.com" and the NextOwner "www!.ns1.mcomdc.com". So the zone confirmes the not-existence of that A RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner wwv~.ns1.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "www.ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.ns1.mcomdc.com" between the NSEC-owner "wwv~.ns1.mcomdc.com" and the NextOwner "www!.ns1.mcomdc.com". So the zone confirmes the not-existence of that CNAME RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner wwv~.ns1.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "www.ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that TXT RR.TXT-Query sends a valid NSEC RR as result with the parent Wildcard "*.ns1.mcomdc.com" between the NSEC-owner "~.ns0~.mcomdc.com" and the NextOwner "ns1!.mcomdc.com". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner ~.ns0~.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "www.ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.ns1.mcomdc.com" between the NSEC-owner "wwv~.ns1.mcomdc.com" and the NextOwner "www!.ns1.mcomdc.com". So the zone confirmes the not-existence of that AAAA RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner wwv~.ns1.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "_443._tcp.www.ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.ns1.mcomdc.com) sends a valid NSEC RR as result with the query name "_443._tcp.www.ns1.mcomdc.com" between the NSEC-owner "_442~._tcp.www.ns1.mcomdc.com" and the NextOwner "_443!._tcp.www.ns1.mcomdc.com". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _442~._tcp.www.ns1.mcomdc.com., Algorithm: 13, 6 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the owner name *.mcomdc.com as the Wildcard-Expansion of the Closest Encloser of the query name "www.ns1.mcomdc.com". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: TXT, RRSIG, NSEC Validated: RRSIG-Owner *.mcomdc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.ns1.mcomdc.com" between the NSEC-owner "wwv~.ns1.mcomdc.com" and the NextOwner "www!.ns1.mcomdc.com". So the zone confirmes the not-existence of that CAA RR.
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner wwv~.ns1.mcomdc.com., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 13.11.2024, 10:18:36 +, Signature-Inception: 30.10.2024, 10:18:36 +, KeyTag 55712, Signer-Name: mcomdc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|