Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26470, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53148, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 12.04.2025, 00:00:00 +, Signature-Inception: 22.03.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: io
|
|
io
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 12.04.2025, 17:00:00 +, Signature-Inception: 30.03.2025, 16:00:00 +, KeyTag 26470, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26470 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34584, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 39585, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 57355, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 15.04.2025, 15:18:02 +, Signature-Inception: 25.03.2025, 14:18:02 +, KeyTag 57355, Signer-Name: io
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 57355 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest "laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: paulgo.io
|
|
paulgo.io
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest rJ1wlf9Z4Ty7vbmlc7Y5a/I3EaRy8/KvVBrblep+Zoo=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner paulgo.io., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 15.04.2025, 15:18:02 +, Signature-Inception: 25.03.2025, 14:18:02 +, KeyTag 34584, Signer-Name: io
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34584 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner paulgo.io., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.05.2025, 04:52:58 +, Signature-Inception: 21.03.2025, 04:52:58 +, KeyTag 2371, Signer-Name: paulgo.io
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "rJ1wlf9Z4Ty7vbmlc7Y5a/I3EaRy8/KvVBrblep+Zoo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 128.140.47.35
Validated: RRSIG-Owner paulgo.io., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:_spf.protonmail.ch mx ~all
protonmail-verification=642ab7e4733d39712dc061638cc674224ec44f48
google-site-verification=ByEYsH8lMOrSZXBEDuM0fbr6sfQ7_erfCYiN0fga-oY
Validated: RRSIG-Owner paulgo.io., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2A01:04F8:0C2C:0F0F:0000:0000:0000:0001
Validated: RRSIG-Owner paulgo.io., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issuecomodoca.com
5|issuedigicert.com; cansignhttpexchanges=yes
5|issueletsencrypt.org
5|issuepki.goog; cansignhttpexchanges=yes
5|issuessl.com
9|issuewildcomodoca.com
9|issuewilddigicert.com; cansignhttpexchanges=yes
9|issuewildletsencrypt.org
9|issuewildpki.goog; cansignhttpexchanges=yes
9|issuewildssl.com
Validated: RRSIG-Owner paulgo.io., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "paulgo.io" equal the NSEC-owner "paulgo.io" and the NextOwner "\000.paulgo.io". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, URI, CAA Validated: RRSIG-Owner paulgo.io., Algorithm: 13, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.paulgo.io) sends a valid NSEC RR as result with the query name "_443._tcp.paulgo.io" equal the NSEC-owner "_443._tcp.paulgo.io" and the NextOwner "\000._443._tcp.paulgo.io". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, 128 Validated: RRSIG-Owner _443._tcp.paulgo.io., Algorithm: 13, 4 Labels, original TTL: 1800 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.paulgo.io
|
|
www.paulgo.io
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: vps01-prd-htz-nrm.paulgo.net
Validated: RRSIG-Owner www.paulgo.io., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 31.03.2025, 21:41:59 +, Signature-Inception: 29.03.2025, 19:41:59 +, KeyTag 34505, Signer-Name: paulgo.io
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26470, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53148, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 12.04.2025, 00:00:00 +, Signature-Inception: 22.03.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: net
|
|
net
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 12.04.2025, 17:00:00 +, Signature-Inception: 30.03.2025, 16:00:00 +, KeyTag 26470, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26470 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 10024, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 07.04.2025, 14:10:35 +, Signature-Inception: 23.03.2025, 14:05:35 +, KeyTag 37331, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: paulgo.net
|
|
paulgo.net
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest 2rLVpYi3q+zTkH677u2kFRcnTJ7GXowneLFxLlqXYxk=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner paulgo.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 05.04.2025, 03:01:05 +, Signature-Inception: 29.03.2025, 01:51:05 +, KeyTag 10024, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 10024 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner paulgo.net., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 16.05.2025, 17:05:07 +, Signature-Inception: 16.03.2025, 17:05:07 +, KeyTag 2371, Signer-Name: paulgo.net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "2rLVpYi3q+zTkH677u2kFRcnTJ7GXowneLFxLlqXYxk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: vps01-prd-htz-nrm.paulgo.net
|
|
vps01-prd-htz-nrm.paulgo.net
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "vps01-prd-htz-nrm.paulgo.net" and the NextOwner "\000.vps01-prd-htz-nrm.paulgo.net". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 128.140.47.35
Validated: RRSIG-Owner vps01-prd-htz-nrm.paulgo.net., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 31.03.2025, 21:42:07 +, Signature-Inception: 29.03.2025, 19:42:07 +, KeyTag 34505, Signer-Name: paulgo.net
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2A01:04F8:0C2C:0F0F:0000:0000:0000:0001
Validated: RRSIG-Owner vps01-prd-htz-nrm.paulgo.net., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 31.03.2025, 21:42:07 +, Signature-Inception: 29.03.2025, 19:42:07 +, KeyTag 34505, Signer-Name: paulgo.net
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "vps01-prd-htz-nrm.paulgo.net" equal the NSEC-owner "vps01-prd-htz-nrm.paulgo.net" and the NextOwner "\000.vps01-prd-htz-nrm.paulgo.net". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner vps01-prd-htz-nrm.paulgo.net., Algorithm: 13, 3 Labels, original TTL: 1800 sec, Signature-expiration: 31.03.2025, 21:42:07 +, Signature-Inception: 29.03.2025, 19:42:07 +, KeyTag 34505, Signer-Name: paulgo.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "vps01-prd-htz-nrm.paulgo.net" equal the NSEC-owner "vps01-prd-htz-nrm.paulgo.net" and the NextOwner "\000.vps01-prd-htz-nrm.paulgo.net". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner vps01-prd-htz-nrm.paulgo.net., Algorithm: 13, 3 Labels, original TTL: 1800 sec, Signature-expiration: 31.03.2025, 21:42:07 +, Signature-Inception: 29.03.2025, 19:42:07 +, KeyTag 34505, Signer-Name: paulgo.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.vps01-prd-htz-nrm.paulgo.net) sends a valid NSEC RR as result with the query name "_443._tcp.vps01-prd-htz-nrm.paulgo.net" equal the NSEC-owner "_443._tcp.vps01-prd-htz-nrm.paulgo.net" and the NextOwner "\000._443._tcp.vps01-prd-htz-nrm.paulgo.net". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, 128 Validated: RRSIG-Owner _443._tcp.vps01-prd-htz-nrm.paulgo.net., Algorithm: 13, 5 Labels, original TTL: 1800 sec, Signature-expiration: 31.03.2025, 21:42:07 +, Signature-Inception: 29.03.2025, 19:42:07 +, KeyTag 34505, Signer-Name: paulgo.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "vps01-prd-htz-nrm.paulgo.net" equal the NSEC-owner "vps01-prd-htz-nrm.paulgo.net" and the NextOwner "\000.vps01-prd-htz-nrm.paulgo.net". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI Validated: RRSIG-Owner vps01-prd-htz-nrm.paulgo.net., Algorithm: 13, 3 Labels, original TTL: 1800 sec, Signature-expiration: 31.03.2025, 21:42:07 +, Signature-Inception: 29.03.2025, 19:42:07 +, KeyTag 34505, Signer-Name: paulgo.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|