Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 46441, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53148, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.07.2025, 00:00:00 +, Signature-Inception: 01.07.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: fr
|
|
fr
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 29133, DigestType 2 and Digest EwPo2o+2DbUA1b6h7l3JorzJPf4vxD00ZXZlj+zPV0k=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner fr., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.07.2025, 17:00:00 +, Signature-Inception: 05.07.2025, 16:00:00 +, KeyTag 46441, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46441 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 29133, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 52627, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner fr., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 20.07.2025, 05:07:22 +, Signature-Inception: 20.06.2025, 04:32:29 +, KeyTag 29133, Signer-Name: fr
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 29133 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 29133, DigestType 2 and Digest "EwPo2o+2DbUA1b6h7l3JorzJPf4vxD00ZXZlj+zPV0k=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: datasense-group.fr
|
|
datasense-group.fr
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 50620, DigestType 2 and Digest JaxuSsKxuUgPSDP14TlCxk121jtti182mW0v8Gv4tBw=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner datasense-group.fr., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 02.08.2025, 07:03:53 +, Signature-Inception: 03.07.2025, 06:13:21 +, KeyTag 52627, Signer-Name: fr
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 52627 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25933, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 50620, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner datasense-group.fr., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| RRSIG-Owner datasense-group.fr., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 50620, Signer-Name: datasense-group.fr
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25933 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 50620 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 50620, DigestType 2 and Digest "JaxuSsKxuUgPSDP14TlCxk121jtti182mW0v8Gv4tBw=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: pct-front-int.datasense-group.fr
|
|
pct-front-int.datasense-group.fr
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: dev.datasense-group.fr
Validated: RRSIG-Owner pct-front-int.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
Zone: www.pct-front-int.datasense-group.fr
|
|
www.pct-front-int.datasense-group.fr
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "fu3k518lqiems441m1bmcspej7j704ba" between the hashed NSEC3-owner "ekbsprn4126dirpbqq5cdegjbsus3b9b" and the hashed NextOwner "hgf6o43rktd3h09l18incv9se74shegh". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner ekbsprn4126dirpbqq5cdegjbsus3b9b.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| DS-Query in the parent zone sends valid NSEC3 RR with the Hash "5545ucnjik1u3ek3srap6qc5480kvl1l" as Owner. That's the Hash of "pct-front-int.datasense-group.fr" with the NextHashedOwnerName "76hps47tprmrr3tdjag3s4okct2fab2u". So that domain name is the Closest Encloser of "www.pct-front-int.datasense-group.fr". Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 5545ucnjik1u3ek3srap6qc5480kvl1l.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| The ClosestEncloser says, that "*.pct-front-int.datasense-group.fr" with the Hash "llrh2g2jpc12f018sjohfb31rr3popg0" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "lfn0p3lh1sqeo3ts2m5b1053orqh0c1c" and the Next Owner "n4mqknvs0jav0ba6kafapmrve68et6ub", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner lfn0p3lh1sqeo3ts2m5b1053orqh0c1c.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 46441, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53148, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.07.2025, 00:00:00 +, Signature-Inception: 01.07.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: fr
|
|
fr
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 29133, DigestType 2 and Digest EwPo2o+2DbUA1b6h7l3JorzJPf4vxD00ZXZlj+zPV0k=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner fr., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.07.2025, 17:00:00 +, Signature-Inception: 05.07.2025, 16:00:00 +, KeyTag 46441, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46441 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 29133, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 52627, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner fr., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 20.07.2025, 05:07:22 +, Signature-Inception: 20.06.2025, 04:32:29 +, KeyTag 29133, Signer-Name: fr
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 29133 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 29133, DigestType 2 and Digest "EwPo2o+2DbUA1b6h7l3JorzJPf4vxD00ZXZlj+zPV0k=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: datasense-group.fr
|
|
datasense-group.fr
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 50620, DigestType 2 and Digest JaxuSsKxuUgPSDP14TlCxk121jtti182mW0v8Gv4tBw=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner datasense-group.fr., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 02.08.2025, 07:03:53 +, Signature-Inception: 03.07.2025, 06:13:21 +, KeyTag 52627, Signer-Name: fr
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 52627 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25933, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 50620, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner datasense-group.fr., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| RRSIG-Owner datasense-group.fr., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 50620, Signer-Name: datasense-group.fr
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25933 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 50620 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 50620, DigestType 2 and Digest "JaxuSsKxuUgPSDP14TlCxk121jtti182mW0v8Gv4tBw=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: dev.datasense-group.fr
|
|
dev.datasense-group.fr
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "hgf6o43rktd3h09l18incv9se74shegh" between the hashed NSEC3-owner "hgf6o43rktd3h09l18incv9se74shegh" and the hashed NextOwner "j8tuevimacdm7l8al7fb5itu6uig0a5u". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner hgf6o43rktd3h09l18incv9se74shegh.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 192.99.32.127
Validated: RRSIG-Owner dev.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "hgf6o43rktd3h09l18incv9se74shegh" equal the hashed NSEC3-owner "hgf6o43rktd3h09l18incv9se74shegh" and the hashed NextOwner "j8tuevimacdm7l8al7fb5itu6uig0a5u". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner hgf6o43rktd3h09l18incv9se74shegh.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "hgf6o43rktd3h09l18incv9se74shegh" equal the hashed NSEC3-owner "hgf6o43rktd3h09l18incv9se74shegh" and the hashed NextOwner "j8tuevimacdm7l8al7fb5itu6uig0a5u". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner hgf6o43rktd3h09l18incv9se74shegh.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "hgf6o43rktd3h09l18incv9se74shegh" equal the hashed NSEC3-owner "hgf6o43rktd3h09l18incv9se74shegh" and the hashed NextOwner "j8tuevimacdm7l8al7fb5itu6uig0a5u". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner hgf6o43rktd3h09l18incv9se74shegh.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.dev.datasense-group.fr) sends a valid NSEC3 RR as result with the hashed owner name "hgf6o43rktd3h09l18incv9se74shegh" (unhashed: dev.datasense-group.fr). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner hgf6o43rktd3h09l18incv9se74shegh.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "rra5euo1gehdime9h47hvkkjjma6tbgt" (unhashed: _tcp.dev.datasense-group.fr) with the owner "p0f4guubgn6hm6eibaocpq714221p011" and the NextOwner "rrpivjoacla1qqsjul19l134ph2inm9b". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner p0f4guubgn6hm6eibaocpq714221p011.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "fk8frhrkkmjagtnf9nrq60hvlufm5nk2" (unhashed: *.dev.datasense-group.fr) with the owner "ekbsprn4126dirpbqq5cdegjbsus3b9b" and the NextOwner "hgf6o43rktd3h09l18incv9se74shegh". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner ekbsprn4126dirpbqq5cdegjbsus3b9b.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "hgf6o43rktd3h09l18incv9se74shegh" equal the hashed NSEC3-owner "hgf6o43rktd3h09l18incv9se74shegh" and the hashed NextOwner "j8tuevimacdm7l8al7fb5itu6uig0a5u". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner hgf6o43rktd3h09l18incv9se74shegh.datasense-group.fr., Algorithm: 8, 3 Labels, original TTL: 300 sec, Signature-expiration: 27.07.2025, 06:32:04 +, Signature-Inception: 27.06.2025, 06:32:04 +, KeyTag 25933, Signer-Name: datasense-group.fr
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|