Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 59944, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.07.2019, 00:00:00 +, Signature-Inception: 01.07.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ee
|
|
ee
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner ee., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.07.2019, 05:00:00 +, Signature-Inception: 05.07.2019, 04:00:00 +, KeyTag 59944, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 8608, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 34382, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner ee., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.07.2019, 07:10:08 +, Signature-Inception: 24.06.2019, 06:18:26 +, KeyTag 8608, Signer-Name: ee
|
|
|
|
|
| RRSIG-Owner ee., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.07.2019, 07:10:08 +, Signature-Inception: 24.06.2019, 06:18:26 +, KeyTag 34382, Signer-Name: ee
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 8608 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34382 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34382, DigestType 2 and Digest "AAo9idxs1LoA6or/7jln06Jt56VF++/ha6B1GPyNVPY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: pictor.ee
|
|
pictor.ee
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "5l7n549tc2g612ep4dg9rllto8hg1e2f" between the hashed NSEC3-owner "5l7n549tc2g612ep4dg9rllto8hg1e2f" and the hashed NextOwner "5l7tm9gvk13129lgus5birdr1q26r1gc". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner 5l7n549tc2g612ep4dg9rllto8hg1e2f.ee., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 31.07.2019, 17:00:49 +, Signature-Inception: 03.07.2019, 16:36:15 +, KeyTag 8608, Signer-Name: ee
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner pictor.ee., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 04.08.2019, 09:53:44 +, Signature-Inception: 05.06.2019, 09:53:44 +, KeyTag 2371, Signer-Name: pictor.ee
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.27.166.26
104.27.167.26
Validated: RRSIG-Owner pictor.ee., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 06.07.2019, 12:29:35 +, Signature-Inception: 04.07.2019, 10:29:35 +, KeyTag 34505, Signer-Name: pictor.ee
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 a mx ptr ip4:95.216.244.233 ip4:144.76.79.112 ip6:2a01:4f8:192:16f::/64 a:86.145.35.213.sta.estpak.ee ~all
Validated: RRSIG-Owner pictor.ee., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 06.07.2019, 12:29:35 +, Signature-Inception: 04.07.2019, 10:29:35 +, KeyTag 34505, Signer-Name: pictor.ee
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2606:4700:0030:0000:0000:0000:681B:A61A
2606:4700:0030:0000:0000:0000:681B:A71A
Validated: RRSIG-Owner pictor.ee., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 06.07.2019, 12:29:35 +, Signature-Inception: 04.07.2019, 10:29:35 +, KeyTag 34505, Signer-Name: pictor.ee
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:35 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner pictor.ee, NextOwner: \000.pictor.ee.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:35 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.pictor.ee, NextOwner: \000._443._tcp.pictor.ee.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:35 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner pictor.ee, NextOwner: \000.pictor.ee.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99
|
|
|
Zone: www.pictor.ee
|
|
www.pictor.ee
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.pictor.ee" and the NextOwner "\000.www.pictor.ee". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.27.166.26
104.27.167.26
Validated: RRSIG-Owner www.pictor.ee., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 06.07.2019, 12:29:36 +, Signature-Inception: 04.07.2019, 10:29:36 +, KeyTag 34505, Signer-Name: pictor.ee
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2606:4700:0030:0000:0000:0000:681B:A61A
2606:4700:0030:0000:0000:0000:681B:A71A
Validated: RRSIG-Owner www.pictor.ee., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 06.07.2019, 12:29:36 +, Signature-Inception: 04.07.2019, 10:29:36 +, KeyTag 34505, Signer-Name: pictor.ee
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:36 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner www.pictor.ee, NextOwner: \000.www.pictor.ee.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:36 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner www.pictor.ee, NextOwner: \000.www.pictor.ee.
Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:36 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.www.pictor.ee, NextOwner: \000._443._tcp.www.pictor.ee.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-07-06 12:29:36 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner www.pictor.ee, NextOwner: \000.www.pictor.ee.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|