| Zone (*) | DNSSEC - Informations |
|---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 46441, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53148, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2025, 00:00:00 +, Signature-Inception: 31.07.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ke
|
|
ke
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 17597, DigestType 2 and Digest T+8LxI89Kft57qDfaVwuCj92j+HGYTPINjkJrJcuZdE=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner ke., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 14.08.2025, 05:00:00 +, Signature-Inception: 01.08.2025, 04:00:00 +, KeyTag 46441, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46441 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 17597, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 39129, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner ke., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 13.08.2025, 16:43:04 +, Signature-Inception: 24.07.2025, 15:13:04 +, KeyTag 17597, Signer-Name: ke
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 17597 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 17597, DigestType 2 and Digest "T+8LxI89Kft57qDfaVwuCj92j+HGYTPINjkJrJcuZdE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: co.ke
|
|
co.ke
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "gj3m6go6u87nbk40qbbptb6j23h5q51k" between the hashed NSEC3-owner "gj3m6go6u87nbk40qbbptb6j23h5q51k" and the hashed NextOwner "gr5h6c9j0bj5qe7303ukhe8i0re9r2vk". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: TXT, RRSIG Validated: RRSIG-Owner gj3m6go6u87nbk40qbbptb6j23h5q51k.ke., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.08.2025, 17:27:46 +, Signature-Inception: 24.07.2025, 15:57:46 +, KeyTag 39129, Signer-Name: ke
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: safaricom.co.ke
|
|
safaricom.co.ke
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 12837, DigestType 2 and Digest GZyITb057YUIuiZioCgMZ4R10qN3nvOspFV0tQ39PeI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner safaricom.co.ke., Algorithm: 8, 3 Labels, original TTL: 86400 sec, Signature-expiration: 13.08.2025, 17:27:46 +, Signature-Inception: 24.07.2025, 15:57:46 +, KeyTag 39129, Signer-Name: ke
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 39129 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 12837, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 17069, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner safaricom.co.ke., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2025, 00:00:00 +, Signature-Inception: 24.07.2025, 00:00:00 +, KeyTag 12837, Signer-Name: safaricom.co.ke
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 12837 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 12837, DigestType 2 and Digest "GZyITb057YUIuiZioCgMZ4R10qN3nvOspFV0tQ39PeI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: safvdi.safaricom.co.ke
|
|
safvdi.safaricom.co.ke
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: rhlddrn.impervadns.net
Validated: RRSIG-Owner safvdi.safaricom.co.ke., Algorithm: 13, 4 Labels, original TTL: 600 sec, Signature-expiration: 14.08.2025, 00:00:00 +, Signature-Inception: 24.07.2025, 00:00:00 +, KeyTag 17069, Signer-Name: safaricom.co.ke
|
|
|
Zone: www.safvdi.safaricom.co.ke
|
|
www.safvdi.safaricom.co.ke
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "an951u36ge6b8uvpkh7j8pf73p6bmihb" between the hashed NSEC3-owner "an951u36ge6b8uvpkh7j8pf73p6bmiha" and the hashed NextOwner "an951u36ge6b8uvpkh7j8pf73p6bmihc". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner an951u36ge6b8uvpkh7j8pf73p6bmiha.safaricom.co.ke., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2025, 00:00:00 +, Signature-Inception: 24.07.2025, 00:00:00 +, KeyTag 17069, Signer-Name: safaricom.co.ke
|
|
|
|
|
| DS-Query in the parent zone sends valid NSEC3 RR with the Hash "579akenpaqttog8o7d0cebp49a8tb7um" as Owner. That's the Hash of "safvdi.safaricom.co.ke" with the NextHashedOwnerName "579akenpaqttog8o7d0cebp49a8tb7un". So that domain name is the Closest Encloser of "www.safvdi.safaricom.co.ke". Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 579akenpaqttog8o7d0cebp49a8tb7um.safaricom.co.ke., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2025, 00:00:00 +, Signature-Inception: 24.07.2025, 00:00:00 +, KeyTag 17069, Signer-Name: safaricom.co.ke
|
|
|
|
|
| The ClosestEncloser says, that "*.safvdi.safaricom.co.ke" with the Hash "rti8aq76ghfq3sk777ruhlclbu41asu1" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "rti8aq76ghfq3sk777ruhlclbu41asu0" and the Next Owner "rti8aq76ghfq3sk777ruhlclbu41asu2", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: No Bitmap? Validated: RRSIG-Owner rti8aq76ghfq3sk777ruhlclbu41asu0.safaricom.co.ke., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 14.08.2025, 00:00:00 +, Signature-Inception: 24.07.2025, 00:00:00 +, KeyTag 17069, Signer-Name: safaricom.co.ke
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 46441, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53148, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2025, 00:00:00 +, Signature-Inception: 31.07.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: net
|
|
net
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 14.08.2025, 05:00:00 +, Signature-Inception: 01.08.2025, 04:00:00 +, KeyTag 46441, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46441 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 33296, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.08.2025, 14:10:35 +, Signature-Inception: 31.07.2025, 14:05:35 +, KeyTag 37331, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: impervadns.net
|
|
impervadns.net
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 15950, DigestType 1 and Digest gq7F9MHMTIBICIkZeleau+lGQGU=
|
|
|
|
|
| DS with Algorithm 8, KeyTag 15950, DigestType 2 and Digest 9aETlUYvFx4ik0Tk4du3O3ocnDw7LCuWizZJfx0rwhQ=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner impervadns.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 05.08.2025, 02:53:48 +, Signature-Inception: 29.07.2025, 01:43:48 +, KeyTag 33296, Signer-Name: net
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 33296 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 15950, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 56281, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner impervadns.net., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 15950, Signer-Name: impervadns.net
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 15950 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 15950, DigestType 1 and Digest "gq7F9MHMTIBICIkZeleau+lGQGU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 15950, DigestType 2 and Digest "9aETlUYvFx4ik0Tk4du3O3ocnDw7LCuWizZJfx0rwhQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: rhlddrn.impervadns.net
|
|
rhlddrn.impervadns.net
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "v46655uoqkmedc571iqndrgr7ekgjoeb" between the hashed NSEC3-owner "v46655uoqkmedc571iqndrgr7ekgjoeb" and the hashed NextOwner "v46ap1pp7s4pf2b2ej6ln15lsh8s7mh7". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner v46655uoqkmedc571iqndrgr7ekgjoeb.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 45.223.20.17
Validated: RRSIG-Owner rhlddrn.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 30 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "v46655uoqkmedc571iqndrgr7ekgjoeb" equal the hashed NSEC3-owner "v46655uoqkmedc571iqndrgr7ekgjoeb" and the hashed NextOwner "v46ap1pp7s4pf2b2ej6ln15lsh8s7mh7". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner v46655uoqkmedc571iqndrgr7ekgjoeb.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "v46655uoqkmedc571iqndrgr7ekgjoeb" equal the hashed NSEC3-owner "v46655uoqkmedc571iqndrgr7ekgjoeb" and the hashed NextOwner "v46ap1pp7s4pf2b2ej6ln15lsh8s7mh7". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner v46655uoqkmedc571iqndrgr7ekgjoeb.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "v46655uoqkmedc571iqndrgr7ekgjoeb" equal the hashed NSEC3-owner "v46655uoqkmedc571iqndrgr7ekgjoeb" and the hashed NextOwner "v46ap1pp7s4pf2b2ej6ln15lsh8s7mh7". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner v46655uoqkmedc571iqndrgr7ekgjoeb.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.rhlddrn.impervadns.net) sends a valid NSEC3 RR as result with the hashed owner name "v46655uoqkmedc571iqndrgr7ekgjoeb" (unhashed: rhlddrn.impervadns.net). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner v46655uoqkmedc571iqndrgr7ekgjoeb.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "vfq8avs40epm2qlm6f1pvufoq4oo0cte" (unhashed: _tcp.rhlddrn.impervadns.net) with the owner "vfq0bbir1308798150dijp1dira6nt1b" and the NextOwner "vfqb8j48d6vb5atpcr4ek2racfn7qtn5". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: A, RRSIG Validated: RRSIG-Owner vfq0bbir1308798150dijp1dira6nt1b.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "fbaef7uua41omtcuot2h48dpq34ekpk3" (unhashed: *.rhlddrn.impervadns.net) with the owner "fbadq8aqjk1pkt3o06vlmj39ohnakon7" and the NextOwner "fbafpqk795cpl67elj579mmbhfkl6u9a". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: A, RRSIG Validated: RRSIG-Owner fbadq8aqjk1pkt3o06vlmj39ohnakon7.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "v46655uoqkmedc571iqndrgr7ekgjoeb" equal the hashed NSEC3-owner "v46655uoqkmedc571iqndrgr7ekgjoeb" and the hashed NextOwner "v46ap1pp7s4pf2b2ej6ln15lsh8s7mh7". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner v46655uoqkmedc571iqndrgr7ekgjoeb.impervadns.net., Algorithm: 8, 3 Labels, original TTL: 60 sec, Signature-expiration: 22.09.2025, 00:00:00 +, Signature-Inception: 22.07.2024, 00:00:00 +, KeyTag 56281, Signer-Name: impervadns.net
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|