Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 22545, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2019, 00:00:00 +, Signature-Inception: 20.11.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: xyz
|
|
xyz
| 2 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 12.12.2019, 05:00:00 +, Signature-Inception: 29.11.2019, 04:00:00 +, KeyTag 22545, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3505, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3599, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 28065, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 06.12.2019, 11:02:39 +, Signature-Inception: 05.11.2019, 22:48:41 +, KeyTag 3599, Signer-Name: xyz
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3599 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest "P6OyZPRdtfOL7erxqIt2qjGMLH8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest "uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: snowill.xyz
|
|
snowill.xyz
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "gr0eo7b5ldq7kdlc7cdhla3on8hf97l9" between the hashed NSEC3-owner "gr05joitu7ummnvckicoq2csin5hnivl" and the hashed NextOwner "gr1krtuattr21nags0j4jjp2s2820421". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner gr05joitu7ummnvckicoq2csin5hnivl.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.12.2019, 18:55:18 +, Signature-Inception: 18.11.2019, 08:45:58 +, KeyTag 28065, Signer-Name: xyz
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner snowill.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 29.12.2019, 14:20:27 +, Signature-Inception: 30.10.2019, 14:20:27 +, KeyTag 2371, Signer-Name: snowill.xyz
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: ca3-6a422807cdd749dca4dbc8bd46546be3
v=spf1 include:spf.mx.hostinger.com include:relay.mailchannels.net ~all
Validated: RRSIG-Owner snowill.xyz., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 30.11.2019, 15:53:31 +, Signature-Inception: 28.11.2019, 13:53:31 +, KeyTag 34505, Signer-Name: snowill.xyz
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issuecomodoca.com
5|issuedigicert.com
5|issueglobalsign.com
5|issueletsencrypt.org
9|issuewildcomodoca.com
9|issuewilddigicert.com
9|issuewildglobalsign.com
9|issuewildletsencrypt.org
Validated: RRSIG-Owner snowill.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 30.11.2019, 15:53:31 +, Signature-Inception: 28.11.2019, 13:53:31 +, KeyTag 34505, Signer-Name: snowill.xyz
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:31 + validates the NSEC RR that proves the not-existence of the A RR. Owner snowill.xyz, NextOwner: \000.snowill.xyz.
Bitmap: NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:31 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner snowill.xyz, NextOwner: \000.snowill.xyz.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:31 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner snowill.xyz, NextOwner: \000.snowill.xyz.
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:31 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.snowill.xyz, NextOwner: \000._443._tcp.snowill.xyz.
Bitmap: RRSIG, NSEC
|
|
|
Zone: www.snowill.xyz
|
|
www.snowill.xyz
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.snowill.xyz" and the NextOwner "\000.www.snowill.xyz". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 34.92.105.245
Validated: RRSIG-Owner www.snowill.xyz., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 30.11.2019, 15:53:32 +, Signature-Inception: 28.11.2019, 13:53:32 +, KeyTag 34505, Signer-Name: snowill.xyz
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:32 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner www.snowill.xyz, NextOwner: \000.www.snowill.xyz.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:32 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner www.snowill.xyz, NextOwner: \000.www.snowill.xyz.
Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:32 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner www.snowill.xyz, NextOwner: \000.www.snowill.xyz.
Bitmap: A, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:33 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.www.snowill.xyz, NextOwner: \000._443._tcp.www.snowill.xyz.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-11-30 15:53:32 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner www.snowill.xyz, NextOwner: \000.www.snowill.xyz.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|