Zone (*) DNSSEC - Informations Zone : (root)(root) 1 DS RR published • Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 48903, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.06.2020, 00:00:00 +, Signature-Inception: 21.05.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : mlml 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ml" and the NextOwner "mlb". So the parent zone confirmes the non-existence of a DS RR.Bitmap: NS, RRSIG, NSEC
0 DNSKEY RR found Zone : i553041.mli553041.ml 0 DS RR in the parent zone found 2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 34505, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner i553041.ml., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 12.06.2020, 15:47:02 +, Signature-Inception: 13.04.2020, 15:47:02 +, KeyTag 2371, Signer-Name: i553041.ml
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSetError: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created. Zone : proxy.i553041.mlproxy.i553041.ml 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "proxy.i553041.ml" and the NextOwner "\000.proxy.i553041.ml". So the parent zone confirmes the non-existence of a DS RR.Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
0 DNSKEY RR found RRSIG Type 47, expiration 2020-05-22 15:18:19 + validates the NSEC RR that proves the not-existence of the A RR. Owner proxy.i553041.ml, NextOwner: \000.proxy.i553041.ml. Bitmap: 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
RRSIG Type 47, expiration 2020-05-22 15:18:19 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner proxy.i553041.ml, NextOwner: \000.proxy.i553041.ml. Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
RRSIG Type 47, expiration 2020-05-22 15:18:19 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner proxy.i553041.ml, NextOwner: \000.proxy.i553041.ml. Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
RRSIG Type 47, expiration 2020-05-22 15:18:19 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner proxy.i553041.ml, NextOwner: \000.proxy.i553041.ml. Bitmap: A, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
RRSIG Type 47, expiration 2020-05-22 15:18:20 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.proxy.i553041.ml, NextOwner: \000._443._tcp.proxy.i553041.ml. Bitmap: RRSIG, NSEC
RRSIG Type 47, expiration 2020-05-22 15:18:20 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner proxy.i553041.ml, NextOwner: \000.proxy.i553041.ml. Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
Zone : www.proxy.i553041.mlwww.proxy.i553041.ml 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.proxy.i553041.ml" and the NextOwner "\000.www.proxy.i553041.ml". So the parent zone confirmes the non-existence of a DS RR.Bitmap: RRSIG, NSEC