Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 22545, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 33853, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.01.2020, 00:00:00 +, Signature-Inception: 01.01.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: earth
|
|
earth
| 4 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner earth., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.01.2020, 17:00:00 +, Signature-Inception: 08.01.2020, 16:00:00 +, KeyTag 33853, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 33853 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 6 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 2215, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 13510, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20983, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 51080, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 58176, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 63532, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner earth., Algorithm: 8, 1 Labels, original TTL: 7200 sec, Signature-expiration: 02.02.2020, 15:14:09 +, Signature-Inception: 03.01.2020, 14:52:24 +, KeyTag 2215, Signer-Name: earth
|
|
|
|
|
| RRSIG-Owner earth., Algorithm: 8, 1 Labels, original TTL: 7200 sec, Signature-expiration: 02.02.2020, 15:14:09 +, Signature-Inception: 03.01.2020, 14:52:24 +, KeyTag 58176, Signer-Name: earth
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 2215 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 58176 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 2215, DigestType 1 and Digest "3rrUXE0atz8k9VQtVbL0BIWXIvU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 2215, DigestType 2 and Digest "qelwldtPTZHCvC91yjQitoEydp55BjU6+PhQrzSjxLo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: farfrom.earth
|
|
farfrom.earth
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "ot2eolauif9b9drp1g57oti1f6j3nvqo" between the hashed NSEC3-owner "onold4dnc5ituobijt1o41jpdr576gnl" and the hashed NextOwner "p1fiokc38tl45s9a5n1vo7mg0v4kaocs". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner onold4dnc5ituobijt1o41jpdr576gnl.earth., Algorithm: 8, 2 Labels, original TTL: 60 sec, Signature-expiration: 03.02.2020, 21:29:04 +, Signature-Inception: 04.01.2020, 20:32:27 +, KeyTag 58176, Signer-Name: earth
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner farfrom.earth., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 28.01.2020, 16:50:20 +, Signature-Inception: 29.11.2019, 16:50:20 +, KeyTag 2371, Signer-Name: farfrom.earth
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
Zone: registry.farfrom.earth
|
|
registry.farfrom.earth
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "registry.farfrom.earth" and the NextOwner "\000.registry.farfrom.earth". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 94.130.22.221
Validated: RRSIG-Owner registry.farfrom.earth., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 09.01.2020, 19:59:33 +, Signature-Inception: 07.01.2020, 17:59:33 +, KeyTag 34505, Signer-Name: farfrom.earth
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-09 19:59:33 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner registry.farfrom.earth, NextOwner: \000.registry.farfrom.earth.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-09 19:59:33 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner registry.farfrom.earth, NextOwner: \000.registry.farfrom.earth.
Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-09 19:59:33 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner registry.farfrom.earth, NextOwner: \000.registry.farfrom.earth.
Bitmap: A, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-09 19:59:33 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.registry.farfrom.earth, NextOwner: \000._443._tcp.registry.farfrom.earth.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2020-01-09 19:59:33 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner registry.farfrom.earth, NextOwner: \000.registry.farfrom.earth.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
Zone: www.registry.farfrom.earth
|
|
www.registry.farfrom.earth
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.registry.farfrom.earth" and the NextOwner "\000.www.registry.farfrom.earth". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: RRSIG, NSEC
|