Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 59944, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.07.2019, 00:00:00 +, Signature-Inception: 20.06.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ai
|
|
ai
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ai" and the NextOwner "aig". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: stamped.ai
|
|
stamped.ai
| 0 DS RR in the parent zone found
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner stamped.ai., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 22.07.2019, 23:25:05 +, Signature-Inception: 23.05.2019, 23:25:05 +, KeyTag 2371, Signer-Name: stamped.ai
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.198.14.52
Validated: RRSIG-Owner stamped.ai., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 27.06.2019, 22:14:25 +, Signature-Inception: 25.06.2019, 20:14:25 +, KeyTag 34505, Signer-Name: stamped.ai
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:_spf.google.com include:_spf.reply.io ~all
google-site-verification=5K_dNaXcWhp0IrNBWazkUhfCDjQdugMHTkNuWiaePm8
Validated: RRSIG-Owner stamped.ai., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 27.06.2019, 22:14:25 +, Signature-Inception: 25.06.2019, 20:14:25 +, KeyTag 34505, Signer-Name: stamped.ai
|
|
|
|
|
| RRSIG Type 47, expiration 2019-06-27 22:14:25 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner stamped.ai, NextOwner: \000.stamped.ai.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-06-27 22:14:25 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner stamped.ai, NextOwner: \000.stamped.ai.
Bitmap: A, NS, SOA, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99
|
|
|
|
|
| RRSIG Type 47, expiration 2019-06-27 22:14:25 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.stamped.ai, NextOwner: \000._443._tcp.stamped.ai.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2019-06-27 22:14:25 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner stamped.ai, NextOwner: \000.stamped.ai.
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, HIP, CDS, CDNSKEY, 61, 99
|
|
|
Zone: www.stamped.ai
|
|
www.stamped.ai
| 0 DS RR in the parent zone found
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 25266, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 59944, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.07.2019, 00:00:00 +, Signature-Inception: 20.06.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 09.07.2019, 17:00:00 +, Signature-Inception: 26.06.2019, 16:00:00 +, KeyTag 25266, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25266 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3800, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.07.2019, 18:25:33 +, Signature-Inception: 21.06.2019, 18:20:33 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: netlify.com
|
|
netlify.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "la5aphutgpjaph4c4q4ju0hq8scb5a3l" between the hashed NSEC3-owner "la59uk1brc9uf1s9839udjfj8rnbg967" and the hashed NextOwner "la5auqjfnlg7jc1ek63fgrak8hj7p78i". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner la59uk1brc9uf1s9839udjfj8rnbg967.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.06.2019, 04:48:02 +, Signature-Inception: 23.06.2019, 03:38:02 +, KeyTag 3800, Signer-Name: com
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: stamped-marketing.netlify.com
|
|
stamped-marketing.netlify.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|