| Zone (*) | DNSSEC - Informations |
|---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 61809, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.11.2025, 00:00:00 +, Signature-Inception: 31.10.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: mm
|
|
mm
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 18589, DigestType 2 and Digest CmZAPaLOtMOWB1BzkHTVynmTNLRcheP+3Xg44BokNdg=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner mm., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 17.11.2025, 17:00:00 +, Signature-Inception: 04.11.2025, 16:00:00 +, KeyTag 61809, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 61809 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18589, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 32298, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner mm., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 11.11.2025, 05:13:34 +, Signature-Inception: 04.11.2025, 08:10:02 +, KeyTag 18589, Signer-Name: mm
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18589 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 18589, DigestType 2 and Digest "CmZAPaLOtMOWB1BzkHTVynmTNLRcheP+3Xg44BokNdg=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com.mm
|
|
com.mm
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 22462, DigestType 2 and Digest VV5RdRmEhyI5ieA6LrgueLJ8dKty2PU8u+8fT1JILF8=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com.mm., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 10.11.2025, 09:44:28 +, Signature-Inception: 03.11.2025, 08:22:02 +, KeyTag 32298, Signer-Name: mm
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 32298 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 22462, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 65160, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com.mm., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 08.11.2025, 03:20:25 +, Signature-Inception: 31.10.2025, 18:23:02 +, KeyTag 22462, Signer-Name: com.mm
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22462 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 22462, DigestType 2 and Digest "VV5RdRmEhyI5ieA6LrgueLJ8dKty2PU8u+8fT1JILF8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ooredoo.com.mm
|
|
ooredoo.com.mm
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "sa4o65iaivtj560jd3ohomp2abp5cegs" between the hashed NSEC3-owner "sa4o65iaivtj560jd3ohomp2abp5cegs" and the hashed NextOwner "sa6ci8ha67ttcrig62ek5q0t95ifouss". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner sa4o65iaivtj560jd3ohomp2abp5cegs.com.mm., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 08.11.2025, 22:23:18 +, Signature-Inception: 02.11.2025, 00:51:02 +, KeyTag 65160, Signer-Name: com.mm
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 19206, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner ooredoo.com.mm., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| • Fatal: Signature is expired
|
|
|
|
|
| Error: DNSKEY 19206 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 103.242.99.6
Validated: RRSIG-Owner ooredoo.com.mm., Algorithm: 13, 3 Labels, original TTL: 7200 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: MS=ms91879998
google-site-verification=ENAfDqkI5P6X_PXNUHcnK4xJ-y2BHrOdoiCo-dTPIoo
tmDdfBJywlnN5QEwMiX7dNnMthBvI3PzxwsyXvIxdRjqg8APIJAfdZOpv/Lpz4olCOs817oRNO1fHeiVQFv3WA==
v=spf1 include:spf.protection.outlook.com ip4:103.242.99.15 ip4:103.242.99.1 ip4:103.242.99.2 ip4:69.160.11.33 -all
Validated: RRSIG-Owner ooredoo.com.mm., Algorithm: 13, 3 Labels, original TTL: 7200 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "ooredoo.com.mm" equal the NSEC-owner "ooredoo.com.mm" and the NextOwner "_dmarc.ooredoo.com.mm". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner ooredoo.com.mm., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "ooredoo.com.mm" equal the NSEC-owner "ooredoo.com.mm" and the NextOwner "_dmarc.ooredoo.com.mm". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner ooredoo.com.mm., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.ooredoo.com.mm) sends a valid NSEC RR as result with the query name "_443._tcp.ooredoo.com.mm" between the NSEC-owner "selector2._domainkey.ooredoo.com.mm" and the NextOwner "_sipfederationtls._tcp.ooredoo.com.mm". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.ooredoo.com.mm) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.ooredoo.com.mm" between the NSEC-owner "selector2._domainkey.ooredoo.com.mm" and the NextOwner "_sipfederationtls._tcp.ooredoo.com.mm". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner selector2._domainkey.ooredoo.com.mm., Algorithm: 13, 5 Labels, original TTL: 10800 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "ooredoo.com.mm" equal the NSEC-owner "ooredoo.com.mm" and the NextOwner "_dmarc.ooredoo.com.mm". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner ooredoo.com.mm., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.ooredoo.com.mm
|
|
www.ooredoo.com.mm
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ooredoo.com.mm" and the NextOwner "_dmarc.ooredoo.com.mm". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: ooredoo.com.mm
Validated: RRSIG-Owner www.ooredoo.com.mm., Algorithm: 13, 4 Labels, original TTL: 7200 sec, Signature-expiration: 25.09.2025, 00:00:00 +, Signature-Inception: 04.09.2025, 00:00:00 +, KeyTag 19206, Signer-Name: ooredoo.com.mm
|