Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 42351, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2021, 00:00:00 +, Signature-Inception: 11.01.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: tech
|
|
tech
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 50095, DigestType 1 and Digest gvcvJGLe4luZ2iRwU1rQp9Ex8es=
|
|
|
|
|
| DS with Algorithm 8, KeyTag 50095, DigestType 2 and Digest g/QNARQUhNjwcwXl0uRKxWYxSQVMWY1unZk8ZhaGxu4=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner tech., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 01.02.2021, 17:00:00 +, Signature-Inception: 19.01.2021, 16:00:00 +, KeyTag 42351, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 19315, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 19578, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 50095, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner tech., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 29.01.2021, 21:32:41 +, Signature-Inception: 30.12.2020, 15:01:33 +, KeyTag 50095, Signer-Name: tech
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 50095 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 50095, DigestType 1 and Digest "gvcvJGLe4luZ2iRwU1rQp9Ex8es=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 50095, DigestType 2 and Digest "g/QNARQUhNjwcwXl0uRKxWYxSQVMWY1unZk8ZhaGxu4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: paul-online.tech
|
|
paul-online.tech
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest F48J2R6NqragHChASvN3ZKt3Ks/1LGDeykz8Ir9/HeI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner paul-online.tech., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 27.01.2021, 18:48:20 +, Signature-Inception: 28.12.2020, 21:42:56 +, KeyTag 19315, Signer-Name: tech
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 19315 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner paul-online.tech., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.02.2021, 08:33:22 +, Signature-Inception: 13.12.2020, 08:33:22 +, KeyTag 2371, Signer-Name: paul-online.tech
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "F48J2R6NqragHChASvN3ZKt3Ks/1LGDeykz8Ir9/HeI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 167.99.241.222
Validated: RRSIG-Owner paul-online.tech., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 20.01.2021, 19:56:40 +, Signature-Inception: 18.01.2021, 17:56:40 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:_spf.protonmail.ch mx ~all
protonmail-verification=291e271607f68611e13f911b02f1e80e69cd1417
google-site-verification=TVvdUlPsgI6WcfLIcqEeFKvdSpf3IW1j4L6Eyn4fJbo
Validated: RRSIG-Owner paul-online.tech., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 20.01.2021, 19:56:40 +, Signature-Inception: 18.01.2021, 17:56:40 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "paul-online.tech" equal the NSEC-owner "paul-online.tech" and the NextOwner "\000.paul-online.tech". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner paul-online.tech., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:56:40 +, Signature-Inception: 18.01.2021, 17:56:40 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "paul-online.tech" equal the NSEC-owner "paul-online.tech" and the NextOwner "\000.paul-online.tech". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner paul-online.tech., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:56:40 +, Signature-Inception: 18.01.2021, 17:56:40 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.paul-online.tech) sends a valid NSEC RR as result with the query name "_443._tcp.paul-online.tech" equal the NSEC-owner "_443._tcp.paul-online.tech" and the NextOwner "\000._443._tcp.paul-online.tech". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.paul-online.tech., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:56:40 +, Signature-Inception: 18.01.2021, 17:56:40 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "paul-online.tech" equal the NSEC-owner "paul-online.tech" and the NextOwner "\000.paul-online.tech". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, 99, URI Validated: RRSIG-Owner paul-online.tech., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:56:40 +, Signature-Inception: 18.01.2021, 17:56:40 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.paul-online.tech
|
|
www.paul-online.tech
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: fra1.do.localnet.site
Validated: RRSIG-Owner www.paul-online.tech., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.01.2021, 19:56:41 +, Signature-Inception: 18.01.2021, 17:56:41 +, KeyTag 34505, Signer-Name: paul-online.tech
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 42351, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2021, 00:00:00 +, Signature-Inception: 11.01.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: site
|
|
site
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 51676, DigestType 1 and Digest kN2+7rlzsPhxntdj+27t6Xxzq/U=
|
|
|
|
|
| DS with Algorithm 8, KeyTag 51676, DigestType 2 and Digest iDF19vXGjqgVY7YtGyt5tqmX1g3G4gzHCv0M1rfoL2I=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner site., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 01.02.2021, 17:00:00 +, Signature-Inception: 19.01.2021, 16:00:00 +, KeyTag 42351, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18264, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38151, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 51676, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner site., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 29.01.2021, 20:46:56 +, Signature-Inception: 30.12.2020, 15:01:33 +, KeyTag 51676, Signer-Name: site
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 51676 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 51676, DigestType 1 and Digest "kN2+7rlzsPhxntdj+27t6Xxzq/U=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 51676, DigestType 2 and Digest "iDF19vXGjqgVY7YtGyt5tqmX1g3G4gzHCv0M1rfoL2I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: localnet.site
|
|
localnet.site
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest NVZ89zW8450820omGM6ksP/xrUJjAbmTNdsNHk7yqnE=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner localnet.site., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 28.01.2021, 00:41:09 +, Signature-Inception: 29.12.2020, 02:01:36 +, KeyTag 18264, Signer-Name: site
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18264 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner localnet.site., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 16.02.2021, 08:07:50 +, Signature-Inception: 18.12.2020, 08:07:50 +, KeyTag 2371, Signer-Name: localnet.site
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "NVZ89zW8450820omGM6ksP/xrUJjAbmTNdsNHk7yqnE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: do.localnet.site
|
|
do.localnet.site
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "do.localnet.site" and the NextOwner "\000.do.localnet.site". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: fra1.do.localnet.site
|
|
fra1.do.localnet.site
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "fra1.do.localnet.site" and the NextOwner "\000.fra1.do.localnet.site". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 167.99.241.222
Validated: RRSIG-Owner fra1.do.localnet.site., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 20.01.2021, 19:57:00 +, Signature-Inception: 18.01.2021, 17:57:00 +, KeyTag 34505, Signer-Name: localnet.site
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "fra1.do.localnet.site" equal the NSEC-owner "fra1.do.localnet.site" and the NextOwner "\000.fra1.do.localnet.site". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner fra1.do.localnet.site., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:57:01 +, Signature-Inception: 18.01.2021, 17:57:01 +, KeyTag 34505, Signer-Name: localnet.site
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "fra1.do.localnet.site" equal the NSEC-owner "fra1.do.localnet.site" and the NextOwner "\000.fra1.do.localnet.site". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner fra1.do.localnet.site., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:57:01 +, Signature-Inception: 18.01.2021, 17:57:01 +, KeyTag 34505, Signer-Name: localnet.site
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "fra1.do.localnet.site" equal the NSEC-owner "fra1.do.localnet.site" and the NextOwner "\000.fra1.do.localnet.site". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner fra1.do.localnet.site., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:57:01 +, Signature-Inception: 18.01.2021, 17:57:01 +, KeyTag 34505, Signer-Name: localnet.site
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.fra1.do.localnet.site) sends a valid NSEC RR as result with the query name "_443._tcp.fra1.do.localnet.site" equal the NSEC-owner "_443._tcp.fra1.do.localnet.site" and the NextOwner "\000._443._tcp.fra1.do.localnet.site". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.fra1.do.localnet.site., Algorithm: 13, 6 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:57:00 +, Signature-Inception: 18.01.2021, 17:57:00 +, KeyTag 34505, Signer-Name: localnet.site
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "fra1.do.localnet.site" equal the NSEC-owner "fra1.do.localnet.site" and the NextOwner "\000.fra1.do.localnet.site". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner fra1.do.localnet.site., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 20.01.2021, 19:57:01 +, Signature-Inception: 18.01.2021, 17:57:01 +, KeyTag 34505, Signer-Name: localnet.site
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|