Zone (*) DNSSEC - Informations Zone : (root)(root) 1 DS RR published DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
• Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 951, Flags 256
Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.04.2023, 00:00:00 +, Signature-Inception: 12.03.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : xyzxyz 2 DS RR in the parent zone found DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest P6OyZPRdtfOL7erxqIt2qjGMLH8=
DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=
1 RRSIG RR to validate DS RR found RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 31.03.2023, 05:00:00 +, Signature-Inception: 18.03.2023, 04:00:00 +, KeyTag 951, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 3599, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 53358, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 16.04.2023, 07:09:10 +, Signature-Inception: 17.03.2023, 07:54:24 +, KeyTag 3599, Signer-Name: xyz
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3599 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest "P6OyZPRdtfOL7erxqIt2qjGMLH8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest "uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : qleroy.xyzqleroy.xyz 1 DS RR in the parent zone found DS with Algorithm 8, KeyTag 8956, DigestType 2 and Digest VBBTSNTm26D2SXKGssOur8aEgeTeBgcdFguovdTciow=
1 RRSIG RR to validate DS RR found RRSIG-Owner qleroy.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 28.03.2023, 00:32:08 +, Signature-Inception: 25.02.2023, 17:47:32 +, KeyTag 53358, Signer-Name: xyz
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53358 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 8956, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 39003, Flags 256
2 RRSIG RR to validate DNSKEY RR found RRSIG-Owner qleroy.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 8956, Signer-Name: qleroy.xyz
RRSIG-Owner qleroy.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 8956 used to validate the DNSKEY RRSet• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 39003 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 8956, DigestType 2 and Digest "VBBTSNTm26D2SXKGssOur8aEgeTeBgcdFguovdTciow=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneRRSIG Type 1 validates the A - Result: 162.19.74.199 Validated: RRSIG-Owner qleroy.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
RRSIG Type 16 validates the TXT - Result: 1|www.qleroy.xyz
v=spf1 include:mx.ovh.com ~all Validated: RRSIG-Owner qleroy.xyz., Algorithm: 8, 2 Labels, original TTL: 600 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "uee489ob5dcspgijmjhh9larkknfkab1" equal the hashed NSEC3-owner "uee489ob5dcspgijmjhh9larkknfkab1" and the hashed NextOwner "7nbfsioio9lampj987tk4mgengff5omg". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner uee489ob5dcspgijmjhh9larkknfkab1.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found. AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "uee489ob5dcspgijmjhh9larkknfkab1" equal the hashed NSEC3-owner "uee489ob5dcspgijmjhh9larkknfkab1" and the hashed NextOwner "7nbfsioio9lampj987tk4mgengff5omg". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner uee489ob5dcspgijmjhh9larkknfkab1.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found. TLSA-Query (_443._tcp.qleroy.xyz) sends a valid NSEC3 RR as result with the hashed owner name "eg61s5io6bohepn9r9jrhti612tta3v5" (unhashed: _tcp.qleroy.xyz). So that's the Closest Encloser of the query name. Bitmap: No Bitmap? Validated: RRSIG-Owner eg61s5io6bohepn9r9jrhti612tta3v5.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "2p4im3cgrb0g410gth6fgk5a83fasi00" (unhashed: *._tcp.qleroy.xyz) with the owner "uee489ob5dcspgijmjhh9larkknfkab1" and the NextOwner "7nbfsioio9lampj987tk4mgengff5omg". So that NSEC3 confirms the not-existence of the Wildcard expansion. Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner uee489ob5dcspgijmjhh9larkknfkab1.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NXDomain-Proof required and found. TLSA-Query (_443._tcp.qleroy.xyz) sends a valid NSEC3 RR as result with the hashed query name "aac5auv72ai5vntsbeng4h6lf3o2no2r" between the hashed NSEC3-owner "7nbfsioio9lampj987tk4mgengff5omg" and the hashed NextOwner "dp05uul85afej9t25cc3sg8lar0jkrvt". So the zone confirmes the not-existence of that TLSA RR.Bitmap: A, RRSIG Validated: RRSIG-Owner 7nbfsioio9lampj987tk4mgengff5omg.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NXDomain-Proof required and found. CAA-Query sends a valid NSEC3 RR as result with the hashed query name "uee489ob5dcspgijmjhh9larkknfkab1" equal the hashed NSEC3-owner "uee489ob5dcspgijmjhh9larkknfkab1" and the hashed NextOwner "7nbfsioio9lampj987tk4mgengff5omg". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner uee489ob5dcspgijmjhh9larkknfkab1.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found. Zone : www.qleroy.xyzwww.qleroy.xyz 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "dp05uul85afej9t25cc3sg8lar0jkrvt" between the hashed NSEC3-owner "dp05uul85afej9t25cc3sg8lar0jkrvt" and the hashed NextOwner "eg61s5io6bohepn9r9jrhti612tta3v5". So the parent zone confirmes the not-existence of a DS RR.Bitmap: TXT, RRSIG Validated: RRSIG-Owner dp05uul85afej9t25cc3sg8lar0jkrvt.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
RRSIG Type 16 validates the TXT - Result: 3|welcome Validated: RRSIG-Owner www.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
A-Query sends a valid NSEC3 RR as result with the hashed query name "dp05uul85afej9t25cc3sg8lar0jkrvt" equal the hashed NSEC3-owner "dp05uul85afej9t25cc3sg8lar0jkrvt" and the hashed NextOwner "eg61s5io6bohepn9r9jrhti612tta3v5". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: TXT, RRSIG Validated: RRSIG-Owner dp05uul85afej9t25cc3sg8lar0jkrvt.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found. CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "dp05uul85afej9t25cc3sg8lar0jkrvt" equal the hashed NSEC3-owner "dp05uul85afej9t25cc3sg8lar0jkrvt" and the hashed NextOwner "eg61s5io6bohepn9r9jrhti612tta3v5". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: TXT, RRSIG Validated: RRSIG-Owner dp05uul85afej9t25cc3sg8lar0jkrvt.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found. AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "dp05uul85afej9t25cc3sg8lar0jkrvt" equal the hashed NSEC3-owner "dp05uul85afej9t25cc3sg8lar0jkrvt" and the hashed NextOwner "eg61s5io6bohepn9r9jrhti612tta3v5". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: TXT, RRSIG Validated: RRSIG-Owner dp05uul85afej9t25cc3sg8lar0jkrvt.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found. TLSA-Query (_443._tcp.www.qleroy.xyz) sends a valid NSEC3 RR as result with the hashed owner name "dp05uul85afej9t25cc3sg8lar0jkrvt" (unhashed: www.qleroy.xyz). So that's the Closest Encloser of the query name. Bitmap: TXT, RRSIG Validated: RRSIG-Owner dp05uul85afej9t25cc3sg8lar0jkrvt.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "hogituen5qkjmpbc7qgrm0jglbnvpjqp" (unhashed: _tcp.www.qleroy.xyz) with the owner "hbec0a7h8k042npl50v75pr39tihla22" and the NextOwner "i1t1v7g0uo4ct9o17bucctmb53dfq5sr". So that NSEC3 confirms the not-existence of the Next Closer Name. Bitmap: CNAME, RRSIG Validated: RRSIG-Owner hbec0a7h8k042npl50v75pr39tihla22.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "olpmamdu6avj0nqlc280n0kkalbhl40c" (unhashed: *.www.qleroy.xyz) with the owner "m7c1o6g6q3g0q4um4slf19jmnfuilkmq" and the NextOwner "orka5023q3m6hemq0trk8lqrfcuc9b24". So that NSEC3 confirms the not-existence of the Wildcard expansion. Bitmap: A, RRSIG Validated: RRSIG-Owner m7c1o6g6q3g0q4um4slf19jmnfuilkmq.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NXDomain-Proof required and found. CAA-Query sends a valid NSEC3 RR as result with the hashed query name "dp05uul85afej9t25cc3sg8lar0jkrvt" equal the hashed NSEC3-owner "dp05uul85afej9t25cc3sg8lar0jkrvt" and the hashed NextOwner "eg61s5io6bohepn9r9jrhti612tta3v5". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: TXT, RRSIG Validated: RRSIG-Owner dp05uul85afej9t25cc3sg8lar0jkrvt.qleroy.xyz., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 17.04.2023, 16:46:00 +, Signature-Inception: 18.03.2023, 16:46:00 +, KeyTag 39003, Signer-Name: qleroy.xyz
Status: Good. NoData-Proof required and found.