Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14748, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.11.2021, 00:00:00 +, Signature-Inception: 31.10.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 22.11.2021, 17:00:00 +, Signature-Inception: 09.11.2021, 16:00:00 +, KeyTag 14748, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14748 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 15549, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.11.2021, 18:24:21 +, Signature-Inception: 06.11.2021, 18:19:21 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: quoininc.com
|
|
quoininc.com
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 59151, DigestType 2 and Digest fnBKJwVslb0jbZh4b4MIBfunbHsH2FB2+RUda6c9Wbc=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 59151, DigestType 4 and Digest TkQGYMF0Hf2nPKmZH3lskk6Hfp5f51c4OlnlLrVWwfmX3u3RSufLG3/alkpIjiko
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner quoininc.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.11.2021, 06:28:20 +, Signature-Inception: 08.11.2021, 05:18:20 +, KeyTag 15549, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 15549 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 58378, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 59151, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner quoininc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2021, 17:47:57 +, Signature-Inception: 07.11.2021, 16:17:57 +, KeyTag 59151, Signer-Name: quoininc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 59151 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 59151, DigestType 2 and Digest "fnBKJwVslb0jbZh4b4MIBfunbHsH2FB2+RUda6c9Wbc=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 59151, DigestType 4 and Digest "TkQGYMF0Hf2nPKmZH3lskk6Hfp5f51c4OlnlLrVWwfmX3u3RSufLG3/alkpIjiko" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: test.quoininc.com
|
|
test.quoininc.com
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 37502, DigestType 2 and Digest wh7H8QRVRpHRLwFOqI4UNMbq6q8F5kY7BcCcm1y8Y0Y=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 37502, DigestType 4 and Digest Nll59IHGpPO7r0p2pyPGtF3A5cHcuW9agJeoq538fdpXjdN1T/NarDevr5ez8mKS
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2021, 15:47:57 +, Signature-Inception: 07.11.2021, 14:17:57 +, KeyTag 58378, Signer-Name: quoininc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 58378 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 15585, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 37502, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 21.11.2021, 10:32:56 +, Signature-Inception: 07.11.2021, 09:02:56 +, KeyTag 37502, Signer-Name: test.quoininc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37502 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37502, DigestType 2 and Digest "wh7H8QRVRpHRLwFOqI4UNMbq6q8F5kY7BcCcm1y8Y0Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37502, DigestType 4 and Digest "Nll59IHGpPO7r0p2pyPGtF3A5cHcuW9agJeoq538fdpXjdN1T/NarDevr5ez8mKS" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the query name "test.quoininc.com" equal the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, NSEC, DNSKEY, CDS, CDNSKEY Validated: RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "test.quoininc.com" equal the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, NSEC, DNSKEY, CDS, CDNSKEY Validated: RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "test.quoininc.com" equal the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, NSEC, DNSKEY, CDS, CDNSKEY Validated: RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "test.quoininc.com" equal the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, NSEC, DNSKEY, CDS, CDNSKEY Validated: RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.test.quoininc.com) sends a valid NSEC RR as result with the owner name test.quoininc.com. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.test.quoininc.com) sends a valid NSEC RR as result with the query name "_443._tcp.test.quoininc.com" between the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.test.quoininc.com) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.test.quoininc.com" between the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: NS, SOA, RRSIG, NSEC, DNSKEY, CDS, CDNSKEY Validated: RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "test.quoininc.com" equal the NSEC-owner "test.quoininc.com" and the NextOwner "mspn-fl.test.quoininc.com". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, NSEC, DNSKEY, CDS, CDNSKEY Validated: RRSIG-Owner test.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.test.quoininc.com
|
|
www.test.quoininc.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: www-test.cloud.quoininc.com
Validated: RRSIG-Owner www.test.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2021, 09:32:56 +, Signature-Inception: 06.11.2021, 08:02:56 +, KeyTag 15585, Signer-Name: test.quoininc.com
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 14748, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.11.2021, 00:00:00 +, Signature-Inception: 31.10.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 22.11.2021, 17:00:00 +, Signature-Inception: 09.11.2021, 16:00:00 +, KeyTag 14748, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14748 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 15549, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.11.2021, 18:24:21 +, Signature-Inception: 06.11.2021, 18:19:21 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: quoininc.com
|
|
quoininc.com
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 59151, DigestType 2 and Digest fnBKJwVslb0jbZh4b4MIBfunbHsH2FB2+RUda6c9Wbc=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 59151, DigestType 4 and Digest TkQGYMF0Hf2nPKmZH3lskk6Hfp5f51c4OlnlLrVWwfmX3u3RSufLG3/alkpIjiko
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner quoininc.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.11.2021, 06:28:20 +, Signature-Inception: 08.11.2021, 05:18:20 +, KeyTag 15549, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 15549 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 58378, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 59151, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner quoininc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2021, 17:47:57 +, Signature-Inception: 07.11.2021, 16:17:57 +, KeyTag 59151, Signer-Name: quoininc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 59151 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 59151, DigestType 2 and Digest "fnBKJwVslb0jbZh4b4MIBfunbHsH2FB2+RUda6c9Wbc=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 59151, DigestType 4 and Digest "TkQGYMF0Hf2nPKmZH3lskk6Hfp5f51c4OlnlLrVWwfmX3u3RSufLG3/alkpIjiko" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: cloud.quoininc.com
|
|
cloud.quoininc.com
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 48609, DigestType 2 and Digest f7eenW25ut0/v/guSLY8NUqam3DoTUPvTjbuJskBJfk=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 48609, DigestType 4 and Digest YO4fSdw9SEAUUZ8d+Rqo/6i7JVy+jbEuBeZ/3b6haRRjW0kUy3EBsB2w1Ly1BCDy
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner cloud.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2021, 15:47:57 +, Signature-Inception: 07.11.2021, 14:17:57 +, KeyTag 58378, Signer-Name: quoininc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 58378 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 48609, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 54867, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner cloud.quoininc.com., Algorithm: 13, 3 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 20:39:55 +, Signature-Inception: 07.11.2021, 19:09:55 +, KeyTag 48609, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 48609 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 48609, DigestType 2 and Digest "f7eenW25ut0/v/guSLY8NUqam3DoTUPvTjbuJskBJfk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 48609, DigestType 4 and Digest "YO4fSdw9SEAUUZ8d+Rqo/6i7JVy+jbEuBeZ/3b6haRRjW0kUy3EBsB2w1Ly1BCDy" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: www-test.cloud.quoininc.com
|
|
www-test.cloud.quoininc.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 54.152.149.174
Validated: RRSIG-Owner www-test.cloud.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 19:38:55 +, Signature-Inception: 07.11.2021, 18:08:55 +, KeyTag 54867, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www-test.cloud.quoininc.com" equal the NSEC-owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www-test.cloud.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 19:38:55 +, Signature-Inception: 07.11.2021, 18:08:55 +, KeyTag 54867, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "www-test.cloud.quoininc.com" equal the NSEC-owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www-test.cloud.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 19:38:55 +, Signature-Inception: 07.11.2021, 18:08:55 +, KeyTag 54867, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www-test.cloud.quoininc.com" equal the NSEC-owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www-test.cloud.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 19:38:55 +, Signature-Inception: 07.11.2021, 18:08:55 +, KeyTag 54867, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www-test.cloud.quoininc.com) sends a valid NSEC RR as result with the owner name www-test.cloud.quoininc.com. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.www-test.cloud.quoininc.com) sends a valid NSEC RR as result with the query name "_443._tcp.www-test.cloud.quoininc.com" between the NSEC-owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.www-test.cloud.quoininc.com) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.www-test.cloud.quoininc.com" between the NSEC-owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www-test.cloud.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 19:38:55 +, Signature-Inception: 07.11.2021, 18:08:55 +, KeyTag 54867, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www-test.cloud.quoininc.com" equal the NSEC-owner "www-test.cloud.quoininc.com" and the NextOwner "cloud.quoininc.com". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner www-test.cloud.quoininc.com., Algorithm: 13, 4 Labels, original TTL: 60 sec, Signature-expiration: 21.11.2021, 19:38:55 +, Signature-Inception: 07.11.2021, 18:08:55 +, KeyTag 54867, Signer-Name: cloud.quoininc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|