Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 59944, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.09.2019, 00:00:00 +, Signature-Inception: 20.08.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ps
|
|
ps
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ps" and the NextOwner "pt". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
Zone: mcmotor.ps
|
|
mcmotor.ps
| 0 DS RR in the parent zone found
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 17134, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 60007, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner mcmotor.ps., Algorithm: 8, 2 Labels, original TTL: 300 sec, Signature-expiration: 16.09.2019, 12:10:17 +, Signature-Inception: 25.08.2019, 12:10:17 +, KeyTag 60007, Signer-Name: mcmotor.ps
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 60007 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 60007 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
Zone: t.mcmotor.ps
|
|
t.mcmotor.ps
| 0 DS RR in the parent zone found
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1, expiration 2019-09-16 12:10:17 + doesn't validate the A - Result. Signature is invalid.
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the A RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
Zone: www.t.mcmotor.ps
|
|
www.t.mcmotor.ps
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 1, expiration 2019-09-16 12:10:17 + doesn't validate the A - Result. Signature is invalid.
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the A RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|
|
|
|
|
| RRSIG Type 50, expiration 2019-09-16 12:10:17 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, NS, SOA, RRSIG, DNSKEY, NSEC3PARAM, CDS
|