Zone (*) DNSSEC - Informations Zone : (root)(root) 1 DS RR published DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
• Status: Valid because published2 DNSKEY RR found Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 42351, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2021, 00:00:00 +, Signature-Inception: 11.01.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : orgorg 1 DS RR in the parent zone found DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
1 RRSIG RR to validate DS RR found RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.01.2021, 05:00:00 +, Signature-Inception: 13.01.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone3 DNSKEY RR found Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 8, KeyTag 34266, Flags 256
Public Key with Algorithm 8, KeyTag 63858, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 01.02.2021, 15:32:04 +, Signature-Inception: 11.01.2021, 14:32:04 +, KeyTag 26974, Signer-Name: org
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : peterjin.orgpeterjin.org 1 DS RR in the parent zone found DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest JIAHV5JAdr7zgSaVkTI4yum3z3Wom19acBm48bDIjTo=
1 RRSIG RR to validate DS RR found RRSIG-Owner peterjin.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 01.02.2021, 15:32:04 +, Signature-Inception: 11.01.2021, 14:32:04 +, KeyTag 63858, Signer-Name: org
• Status: Good - Algorithmus 8 and DNSKEY with KeyTag 63858 used to validate the DS RRSet in the parent zone2 DNSKEY RR found Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 34505, Flags 256
1 RRSIG RR to validate DNSKEY RR found RRSIG-Owner peterjin.org., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 05.02.2021, 04:27:31 +, Signature-Inception: 07.12.2020, 04:27:31 +, KeyTag 2371, Signer-Name: peterjin.org
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "JIAHV5JAdr7zgSaVkTI4yum3z3Wom19acBm48bDIjTo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : rdns.peterjin.orgrdns.peterjin.org 1 DS RR in the parent zone found DS with Algorithm 13, KeyTag 16834, DigestType 2 and Digest fDiriOAJyFS/EjedzNWMH4+6PNbrEeuxyDI4VTwil0s=
1 RRSIG RR to validate DS RR found RRSIG-Owner rdns.peterjin.org., Algorithm: 13, 3 Labels, original TTL: 600 sec, Signature-expiration: 14.01.2021, 14:05:25 +, Signature-Inception: 12.01.2021, 12:05:25 +, KeyTag 34505, Signer-Name: peterjin.org
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 34505 used to validate the DS RRSet in the parent zone3 DNSKEY RR found Public Key with Algorithm 13, KeyTag 16834, Flags 257 (SEP = Secure Entry Point)
Public Key with Algorithm 13, KeyTag 36987, Flags 256
Public Key with Algorithm 13, KeyTag 48011, Flags 256
2 RRSIG RR to validate DNSKEY RR found RRSIG-Owner rdns.peterjin.org., Algorithm: 13, 3 Labels, original TTL: 1000 sec, Signature-expiration: 05.02.2021, 06:08:06 +, Signature-Inception: 06.01.2021, 06:08:06 +, KeyTag 16834, Signer-Name: rdns.peterjin.org
RRSIG-Owner rdns.peterjin.org., Algorithm: 13, 3 Labels, original TTL: 1000 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 16834 used to validate the DNSKEY RRSet• Status: Good - Algorithmus 13 and DNSKEY with KeyTag 36987 used to validate the DNSKEY RRSet• Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 16834, DigestType 2 and Digest "fDiriOAJyFS/EjedzNWMH4+6PNbrEeuxyDI4VTwil0s=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zoneZone : t.rdns.peterjin.orgt.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "k5ghqv6ojgmoeo1t70ctf69orss6uva2" between the hashed NSEC3-owner "k5ghqv6ojgmoeo1t70ctf69orss6uva2" and the hashed NextOwner "k5k0u9bqlkjgrhmej536j40k2q7kb12q". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner k5ghqv6ojgmoeo1t70ctf69orss6uva2.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found Zone : mountain-o.t.rdns.peterjin.orgmountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "p7glpb70mggddr65bdk597l5igjnd3lu" between the hashed NSEC3-owner "p7glpb70mggddr65bdk597l5igjnd3lu" and the hashed NextOwner "p7hvu8peh7iuhidrls3ckas60qdqdmdt". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner p7glpb70mggddr65bdk597l5igjnd3lu.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found Zone : the.mountain-o.t.rdns.peterjin.orgthe.mountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "0kkuhntgibjc79968bhc8nfphsib576j" between the hashed NSEC3-owner "0kkuhntgibjc79968bhc8nfphsib576j" and the hashed NextOwner "0klh4e3c5ner4bkue6mbjl9lc4l2ga0n". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner 0kkuhntgibjc79968bhc8nfphsib576j.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found Zone : round.the.mountain-o.t.rdns.peterjin.orground.the.mountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "9ano8auu2p19k60b8nt10uh05nakl39q" between the hashed NSEC3-owner "9ano8auu2p19k60b8nt10uh05nakl39q" and the hashed NextOwner "9atj2ni8rssu3d2mq055ng594qa9sep0". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner 9ano8auu2p19k60b8nt10uh05nakl39q.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found Zone : coming.round.the.mountain-o.t.rdns.peterjin.orgcoming.round.the.mountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "j0mu50ekqn5qe7g91pn48sot6aotiti9" between the hashed NSEC3-owner "j0mu50ekqn5qe7g91pn48sot6aotiti9" and the hashed NextOwner "j0o1le401eifp5e8h63g8rn1habd9k56". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner j0mu50ekqn5qe7g91pn48sot6aotiti9.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found Zone : be.coming.round.the.mountain-o.t.rdns.peterjin.orgbe.coming.round.the.mountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "a74bjkb52vb7c09e1vt3nae1vulgr5c7" between the hashed NSEC3-owner "a74bjkb52vb7c09e1vt3nae1vulgr5c7" and the hashed NextOwner "a7a2ail34t9316uokpam5qb64pohctne". So the parent zone confirmes the not-existence of a DS RR.Bitmap: No Bitmap? Validated: RRSIG-Owner a74bjkb52vb7c09e1vt3nae1vulgr5c7.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found Zone : she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.orgshe-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "vkqnhfp4l6946j5lanugluf3p1icnulf" between the hashed NSEC3-owner "vkqnhfp4l6946j5lanugluf3p1icnulf" and the hashed NextOwner "vkr2h3ro0r6fttolbga1uno0aatqunkv". So the parent zone confirmes the not-existence of a DS RR.Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
0 DNSKEY RR found RRSIG Type 28 validates the AAAA - Result: 2602:0806:A003:040F:0000:0001:0001:FF10 Validated: RRSIG-Owner she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org., Algorithm: 13, 10 Labels, original TTL: 600 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
A-Query sends a valid NSEC3 RR as result with the hashed query name "vkqnhfp4l6946j5lanugluf3p1icnulf" equal the hashed NSEC3-owner "vkqnhfp4l6946j5lanugluf3p1icnulf" and the hashed NextOwner "vkr2h3ro0r6fttolbga1uno0aatqunkv". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NoData-Proof required and found. CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "vkqnhfp4l6946j5lanugluf3p1icnulf" equal the hashed NSEC3-owner "vkqnhfp4l6946j5lanugluf3p1icnulf" and the hashed NextOwner "vkr2h3ro0r6fttolbga1uno0aatqunkv". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NoData-Proof required and found. TXT-Query sends a valid NSEC3 RR as result with the hashed query name "vkqnhfp4l6946j5lanugluf3p1icnulf" equal the hashed NSEC3-owner "vkqnhfp4l6946j5lanugluf3p1icnulf" and the hashed NextOwner "vkr2h3ro0r6fttolbga1uno0aatqunkv". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NoData-Proof required and found. TLSA-Query (_443._tcp.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org) sends a valid NSEC3 RR as result with the hashed owner name "vkqnhfp4l6946j5lanugluf3p1icnulf" (unhashed: she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org). So that's the Closest Encloser of the query name. Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "fu9rqp39cpfp9d5kvfarg9av3abo9q83" (unhashed: _tcp.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org) with the owner "fu7s0qm9bve9s0fgp0juemfugmgimeus" and the NextOwner "fuam6fme4um2b8p4t0euegobrrpakv2c". So that NSEC3 confirms the not-existence of the Next Closer Name. Bitmap: No Bitmap? Validated: RRSIG-Owner fu7s0qm9bve9s0fgp0juemfugmgimeus.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NXDomain-Proof required and found. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "atuh62cuu4910520b5mdk0k49504r2lc" (unhashed: *.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org) with the owner "ats2jv8d36gcmheeejo7phug6e6d18qp" and the NextOwner "au1galm20gfvhk3b9nhvhnsfvpednp3n". So that NSEC3 confirms the not-existence of the Wildcard expansion. Bitmap: AAAA, RRSIG Validated: RRSIG-Owner ats2jv8d36gcmheeejo7phug6e6d18qp.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NXDomain-Proof required and found. CAA-Query sends a valid NSEC3 RR as result with the hashed query name "vkqnhfp4l6946j5lanugluf3p1icnulf" equal the hashed NSEC3-owner "vkqnhfp4l6946j5lanugluf3p1icnulf" and the hashed NextOwner "vkr2h3ro0r6fttolbga1uno0aatqunkv". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
Status: Good. NoData-Proof required and found. Zone : www.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.orgwww.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org 0 DS RR in the parent zone found DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "ml7i76pam5ra2pfniqhir5c67pu231u2" between the hashed NSEC3-owner "mks6m27jg4j1mdq319qtpn7be020ksk3" and the hashed NextOwner "ml8h4t5k8cr5augn7ea6q83qpsob5do3". So the parent zone confirmes the not-existence of a DS RR.Bitmap: AAAA, RRSIG Validated: RRSIG-Owner mks6m27jg4j1mdq319qtpn7be020ksk3.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
DS-Query in the parent zone sends valid NSEC3 RR with the Hash "vkqnhfp4l6946j5lanugluf3p1icnulf" as Owner. That's the Hash of "she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org" with the NextHashedOwnerName "vkr2h3ro0r6fttolbga1uno0aatqunkv". So that domain name is the Closest Encloser of "www.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org". Opt-Out: False.Bitmap: AAAA, RRSIG Validated: RRSIG-Owner vkqnhfp4l6946j5lanugluf3p1icnulf.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org
The ClosestEncloser says, that "*.she-ll.be.coming.round.the.mountain-o.t.rdns.peterjin.org" with the Hash "atuh62cuu4910520b5mdk0k49504r2lc" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "ats2jv8d36gcmheeejo7phug6e6d18qp" and the Next Owner "au1galm20gfvhk3b9nhvhnsfvpednp3n", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.Bitmap: AAAA, RRSIG Validated: RRSIG-Owner ats2jv8d36gcmheeejo7phug6e6d18qp.rdns.peterjin.org., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 10.02.2021, 17:42:44 +, Signature-Inception: 11.01.2021, 17:42:44 +, KeyTag 36987, Signer-Name: rdns.peterjin.org