Zone (*) DNSSEC - Informations Zone : (root)(root) 1 DS RR published DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
• Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 951, Flags 256
Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 23.03.2023, 00:00:00 +, Signature-Inception: 02.03.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : orgorg 1 DS RR in the parent zone found DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
1 RRSIG RR to validate DS RR found RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.03.2023, 05:00:00 +, Signature-Inception: 08.03.2023, 04:00:00 +, KeyTag 951, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone3 DNSKEY RR found Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 31878, Flags 256
Public Key with Algorithm 8, KeyTag 59280, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.03.2023, 15:29:01 +, Signature-Inception: 01.03.2023, 14:29:01 +, KeyTag 26974, Signer-Name: org
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : familybrown.orgfamilybrown.org 1 DS RR in the parent zone found DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest yboToTwEnmvvaWZuJbGPQIpZ/V6P8BsZLi18KxL1UMM=
1 RRSIG RR to validate DS RR found RRSIG-Owner familybrown.org., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 22.03.2023, 15:29:01 +, Signature-Inception: 01.03.2023, 14:29:01 +, KeyTag 31878, Signer-Name: org
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 31878 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 34505, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner familybrown.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 02.05.2023, 13:28:37 +, Signature-Inception: 02.03.2023, 13:28:37 +, KeyTag 2371, Signer-Name: familybrown.org
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "yboToTwEnmvvaWZuJbGPQIpZ/V6P8BsZLi18KxL1UMM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : ns8.familybrown.orgns8.familybrown.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ns8.familybrown.org" and the NextOwner "\000.ns8.familybrown.org". So the parent zone confirmes the non-existence of a DS RR.Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA
0 DNSKEY RR found RRSIG Type 1 validates the A - Result: 66.94.117.228 Validated: RRSIG-Owner ns8.familybrown.org., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 09.03.2023, 13:37:24 +, Signature-Inception: 07.03.2023, 11:37:24 +, KeyTag 34505, Signer-Name: familybrown.org
CNAME-Query sends a valid NSEC RR as result with the query name "ns8.familybrown.org" equal the NSEC-owner "ns8.familybrown.org" and the NextOwner "\000.ns8.familybrown.org". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner ns8.familybrown.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.03.2023, 13:37:24 +, Signature-Inception: 07.03.2023, 11:37:24 +, KeyTag 34505, Signer-Name: familybrown.org
Status: Good. NoData-Proof required and found. TXT-Query sends a valid NSEC RR as result with the query name "ns8.familybrown.org" equal the NSEC-owner "ns8.familybrown.org" and the NextOwner "\000.ns8.familybrown.org". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner ns8.familybrown.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.03.2023, 13:37:24 +, Signature-Inception: 07.03.2023, 11:37:24 +, KeyTag 34505, Signer-Name: familybrown.org
Status: Good. NoData-Proof required and found. AAAA-Query sends a valid NSEC RR as result with the query name "ns8.familybrown.org" equal the NSEC-owner "ns8.familybrown.org" and the NextOwner "\000.ns8.familybrown.org". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner ns8.familybrown.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.03.2023, 13:37:24 +, Signature-Inception: 07.03.2023, 11:37:24 +, KeyTag 34505, Signer-Name: familybrown.org
Status: Good. NoData-Proof required and found. TLSA-Query (_443._tcp.ns8.familybrown.org) sends a valid NSEC RR as result with the query name "_443._tcp.ns8.familybrown.org" equal the NSEC-owner "_443._tcp.ns8.familybrown.org" and the NextOwner "\000._443._tcp.ns8.familybrown.org". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.ns8.familybrown.org., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 09.03.2023, 13:37:24 +, Signature-Inception: 07.03.2023, 11:37:24 +, KeyTag 34505, Signer-Name: familybrown.org
Status: Good. NoData-Proof required and found. CAA-Query sends a valid NSEC RR as result with the query name "ns8.familybrown.org" equal the NSEC-owner "ns8.familybrown.org" and the NextOwner "\000.ns8.familybrown.org". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI Validated: RRSIG-Owner ns8.familybrown.org., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.03.2023, 13:37:24 +, Signature-Inception: 07.03.2023, 11:37:24 +, KeyTag 34505, Signer-Name: familybrown.org
Status: Good. NoData-Proof required and found. Zone : www.ns8.familybrown.orgwww.ns8.familybrown.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.ns8.familybrown.org" and the NextOwner "\000.www.ns8.familybrown.org". So the parent zone confirmes the non-existence of a DS RR.Bitmap: RRSIG, NSEC