Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 47671, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.05.2022, 00:00:00 +, Signature-Inception: 11.04.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: md
|
|
md
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 14, KeyTag 127, DigestType 2 and Digest ymdPSlS+RimVDs39SSuCxd/IMwBpJNXwb0B0mlQ90dQ=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner md., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 01.05.2022, 05:00:00 +, Signature-Inception: 18.04.2022, 04:00:00 +, KeyTag 47671, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 47671 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 14, KeyTag 127, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 14, KeyTag 41826, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner md., Algorithm: 14, 1 Labels, original TTL: 1800 sec, Signature-expiration: 25.04.2022, 12:00:04 +, Signature-Inception: 18.04.2022, 12:00:04 +, KeyTag 127, Signer-Name: md
|
|
|
|
|
| RRSIG-Owner md., Algorithm: 14, 1 Labels, original TTL: 1800 sec, Signature-expiration: 25.04.2022, 12:00:04 +, Signature-Inception: 18.04.2022, 12:00:04 +, KeyTag 41826, Signer-Name: md
|
|
|
|
|
| • Status: Good - Algorithmus 14 and DNSKEY with KeyTag 127 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 14 and DNSKEY with KeyTag 41826 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 14, KeyTag 127, DigestType 2 and Digest "ymdPSlS+RimVDs39SSuCxd/IMwBpJNXwb0B0mlQ90dQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: jurnalfm.md
|
|
jurnalfm.md
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest bUL9Kk9r7EXkELo2dYVZqOOF9/3G1o+XOMSwJ9ley9s=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner jurnalfm.md., Algorithm: 14, 2 Labels, original TTL: 1800 sec, Signature-expiration: 25.04.2022, 12:00:04 +, Signature-Inception: 18.04.2022, 12:00:04 +, KeyTag 41826, Signer-Name: md
|
|
|
|
|
| • Status: Good - Algorithmus 14 and DNSKEY with KeyTag 41826 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner jurnalfm.md., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 28.05.2022, 02:19:03 +, Signature-Inception: 28.03.2022, 02:19:03 +, KeyTag 2371, Signer-Name: jurnalfm.md
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "bUL9Kk9r7EXkELo2dYVZqOOF9/3G1o+XOMSwJ9ley9s=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: stream.jurnalfm.md
|
|
stream.jurnalfm.md
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "stream.jurnalfm.md" and the NextOwner "\000.stream.jurnalfm.md". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 95.216.157.92
Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 19.04.2022, 14:36:45 +, Signature-Inception: 17.04.2022, 12:36:45 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: hetzner_b.jurnalfm.md
Validated: RRSIG-Owner stream.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 19.04.2022, 14:36:45 +, Signature-Inception: 17.04.2022, 12:36:45 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2A01:04F9:C011:4C66:0000:0000:0000:0001
Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 19.04.2022, 14:36:45 +, Signature-Inception: 17.04.2022, 12:36:45 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "stream.jurnalfm.md" equal the NSEC-owner "stream.jurnalfm.md" and the NextOwner "\000.stream.jurnalfm.md". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner stream.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:36:45 +, Signature-Inception: 17.04.2022, 12:36:45 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.stream.jurnalfm.md) sends a valid NSEC RR as result with the query name "_443._tcp.stream.jurnalfm.md" equal the NSEC-owner "_443._tcp.stream.jurnalfm.md" and the NextOwner "\000._443._tcp.stream.jurnalfm.md". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.stream.jurnalfm.md., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:36:46 +, Signature-Inception: 17.04.2022, 12:36:46 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "stream.jurnalfm.md" equal the NSEC-owner "stream.jurnalfm.md" and the NextOwner "\000.stream.jurnalfm.md". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner stream.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:36:45 +, Signature-Inception: 17.04.2022, 12:36:45 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.stream.jurnalfm.md
|
|
www.stream.jurnalfm.md
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.stream.jurnalfm.md" and the NextOwner "\000.www.stream.jurnalfm.md". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: RRSIG, NSEC
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 47671, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.05.2022, 00:00:00 +, Signature-Inception: 11.04.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: md
|
|
md
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 14, KeyTag 127, DigestType 2 and Digest ymdPSlS+RimVDs39SSuCxd/IMwBpJNXwb0B0mlQ90dQ=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner md., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 01.05.2022, 05:00:00 +, Signature-Inception: 18.04.2022, 04:00:00 +, KeyTag 47671, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 47671 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 14, KeyTag 127, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 14, KeyTag 41826, Flags 256
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner md., Algorithm: 14, 1 Labels, original TTL: 1800 sec, Signature-expiration: 25.04.2022, 12:00:04 +, Signature-Inception: 18.04.2022, 12:00:04 +, KeyTag 127, Signer-Name: md
|
|
|
|
|
| RRSIG-Owner md., Algorithm: 14, 1 Labels, original TTL: 1800 sec, Signature-expiration: 25.04.2022, 12:00:04 +, Signature-Inception: 18.04.2022, 12:00:04 +, KeyTag 41826, Signer-Name: md
|
|
|
|
|
| • Status: Good - Algorithmus 14 and DNSKEY with KeyTag 127 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 14 and DNSKEY with KeyTag 41826 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 14, KeyTag 127, DigestType 2 and Digest "ymdPSlS+RimVDs39SSuCxd/IMwBpJNXwb0B0mlQ90dQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: jurnalfm.md
|
|
jurnalfm.md
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest bUL9Kk9r7EXkELo2dYVZqOOF9/3G1o+XOMSwJ9ley9s=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner jurnalfm.md., Algorithm: 14, 2 Labels, original TTL: 1800 sec, Signature-expiration: 25.04.2022, 12:00:04 +, Signature-Inception: 18.04.2022, 12:00:04 +, KeyTag 41826, Signer-Name: md
|
|
|
|
|
| • Status: Good - Algorithmus 14 and DNSKEY with KeyTag 41826 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner jurnalfm.md., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 28.05.2022, 02:19:03 +, Signature-Inception: 28.03.2022, 02:19:03 +, KeyTag 2371, Signer-Name: jurnalfm.md
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "bUL9Kk9r7EXkELo2dYVZqOOF9/3G1o+XOMSwJ9ley9s=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: hetzner_b.jurnalfm.md
|
|
hetzner_b.jurnalfm.md
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "hetzner_b.jurnalfm.md" and the NextOwner "\000.hetzner_b.jurnalfm.md". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 95.216.157.92
Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 19.04.2022, 14:37:07 +, Signature-Inception: 17.04.2022, 12:37:07 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2A01:04F9:C011:4C66:0000:0000:0000:0001
Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 19.04.2022, 14:37:07 +, Signature-Inception: 17.04.2022, 12:37:07 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "hetzner_b.jurnalfm.md" equal the NSEC-owner "hetzner_b.jurnalfm.md" and the NextOwner "\000.hetzner_b.jurnalfm.md". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:37:07 +, Signature-Inception: 17.04.2022, 12:37:07 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "hetzner_b.jurnalfm.md" equal the NSEC-owner "hetzner_b.jurnalfm.md" and the NextOwner "\000.hetzner_b.jurnalfm.md". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI, CAA Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:37:07 +, Signature-Inception: 17.04.2022, 12:37:07 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.hetzner_b.jurnalfm.md) sends a valid NSEC RR as result with the query name "_443._tcp.hetzner_b.jurnalfm.md" equal the NSEC-owner "_443._tcp.hetzner_b.jurnalfm.md" and the NextOwner "\000._443._tcp.hetzner_b.jurnalfm.md". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC Validated: RRSIG-Owner _443._tcp.hetzner_b.jurnalfm.md., Algorithm: 13, 5 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:37:07 +, Signature-Inception: 17.04.2022, 12:37:07 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "hetzner_b.jurnalfm.md" equal the NSEC-owner "hetzner_b.jurnalfm.md" and the NextOwner "\000.hetzner_b.jurnalfm.md". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, 99, URI Validated: RRSIG-Owner hetzner_b.jurnalfm.md., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 19.04.2022, 14:37:07 +, Signature-Inception: 17.04.2022, 12:37:07 +, KeyTag 34505, Signer-Name: jurnalfm.md
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|