Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 33853, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 48903, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.04.2020, 00:00:00 +, Signature-Inception: 21.03.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ooo
|
|
ooo
| 3 DS RR in the parent zone found
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner ooo., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.04.2020, 05:00:00 +, Signature-Inception: 28.03.2020, 04:00:00 +, KeyTag 33853, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 33853 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 28264, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 32919, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 41890, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 62653, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner ooo., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 24.04.2020, 08:40:07 +, Signature-Inception: 24.03.2020, 21:40:00 +, KeyTag 41890, Signer-Name: ooo
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 41890 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 41890, DigestType 1 and Digest "J93mM7c90fJwPAqJaVhisFag0p8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 41890, DigestType 2 and Digest "+YB1ViV/ImZgswhJB3a3L+vXDf3i7NnoUPoRJ7N8d5k=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: oooh.ooo
|
|
oooh.ooo
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "1nmjvrsg2jp5m55l3imucqvr4jf5shdf" between the hashed NSEC3-owner "1mtatjjf23utfejvngj7lrlrnjf50skk" and the hashed NextOwner "1sdvahkngb57rlf921bv4ekrj2h3v0ae". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 1mtatjjf23utfejvngj7lrlrnjf50skk.ooo., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 16.04.2020, 20:54:22 +, Signature-Inception: 17.03.2020, 07:38:00 +, KeyTag 28264, Signer-Name: ooo
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner oooh.ooo., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.04.2020, 19:04:41 +, Signature-Inception: 21.02.2020, 19:04:41 +, KeyTag 2371, Signer-Name: oooh.ooo
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
Zone: webmail.oooh.ooo
|
|
webmail.oooh.ooo
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "webmail.oooh.ooo" and the NextOwner "\000.webmail.oooh.ooo". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 188.68.43.173
Validated: RRSIG-Owner n1.oooh.ooo., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 29.03.2020, 15:10:57 +, Signature-Inception: 27.03.2020, 13:10:57 +, KeyTag 34505, Signer-Name: oooh.ooo
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result:
Validated: RRSIG-Owner webmail.oooh.ooo., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 29.03.2020, 15:10:57 +, Signature-Inception: 27.03.2020, 13:10:57 +, KeyTag 34505, Signer-Name: oooh.ooo
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:10:57 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner webmail.oooh.ooo, NextOwner: \000.webmail.oooh.ooo.
Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:10:57 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner webmail.oooh.ooo, NextOwner: \000.webmail.oooh.ooo.
Bitmap: A, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:10:57 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.webmail.oooh.ooo, NextOwner: \000._443._tcp.webmail.oooh.ooo.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:10:57 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner webmail.oooh.ooo, NextOwner: \000.webmail.oooh.ooo.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|
|
|
Zone: www.webmail.oooh.ooo
|
|
www.webmail.oooh.ooo
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.webmail.oooh.ooo" and the NextOwner "\000.www.webmail.oooh.ooo". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: RRSIG, NSEC
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 33853, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 48903, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.04.2020, 00:00:00 +, Signature-Inception: 21.03.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: ooo
|
|
ooo
| 3 DS RR in the parent zone found
|
|
|
|
|
| 2 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner ooo., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.04.2020, 05:00:00 +, Signature-Inception: 28.03.2020, 04:00:00 +, KeyTag 33853, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 33853 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 4 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 28264, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 32919, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 41890, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 62653, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner ooo., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 24.04.2020, 08:40:07 +, Signature-Inception: 24.03.2020, 21:40:00 +, KeyTag 41890, Signer-Name: ooo
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 41890 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 41890, DigestType 1 and Digest "J93mM7c90fJwPAqJaVhisFag0p8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 41890, DigestType 2 and Digest "+YB1ViV/ImZgswhJB3a3L+vXDf3i7NnoUPoRJ7N8d5k=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: oooh.ooo
|
|
oooh.ooo
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "1nmjvrsg2jp5m55l3imucqvr4jf5shdf" between the hashed NSEC3-owner "1mtatjjf23utfejvngj7lrlrnjf50skk" and the hashed NextOwner "1sdvahkngb57rlf921bv4ekrj2h3v0ae". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 1mtatjjf23utfejvngj7lrlrnjf50skk.ooo., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 16.04.2020, 20:54:22 +, Signature-Inception: 17.03.2020, 07:38:00 +, KeyTag 28264, Signer-Name: ooo
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner oooh.ooo., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.04.2020, 19:04:41 +, Signature-Inception: 21.02.2020, 19:04:41 +, KeyTag 2371, Signer-Name: oooh.ooo
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| Error: DNSKEY 2371 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.
|
|
|
Zone: n1.oooh.ooo
|
|
n1.oooh.ooo
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "n1.oooh.ooo" and the NextOwner "\000.n1.oooh.ooo". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 188.68.43.173
Validated: RRSIG-Owner n1.oooh.ooo., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 29.03.2020, 15:11:02 +, Signature-Inception: 27.03.2020, 13:11:02 +, KeyTag 34505, Signer-Name: oooh.ooo
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:11:02 + validates the NSEC RR that proves the not-existence of the CNAME RR. Owner n1.oooh.ooo, NextOwner: \000.n1.oooh.ooo.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:11:02 + validates the NSEC RR that proves the not-existence of the TXT RR. Owner n1.oooh.ooo, NextOwner: \000.n1.oooh.ooo.
Bitmap: A, 13, MX, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:11:02 + validates the NSEC RR that proves the not-existence of the AAAA RR. Owner n1.oooh.ooo, NextOwner: \000.n1.oooh.ooo.
Bitmap: A, 13, MX, TXT, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99, CAA
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:11:02 + validates the NSEC RR that proves the not-existence of the TLSA RR. Owner _443._tcp.n1.oooh.ooo, NextOwner: \000._443._tcp.n1.oooh.ooo.
Bitmap: RRSIG, NSEC
|
|
|
|
|
| RRSIG Type 47, expiration 2020-03-29 15:11:02 + validates the NSEC RR that proves the not-existence of the CAA RR. Owner n1.oooh.ooo, NextOwner: \000.n1.oooh.ooo.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, CERT, SSHFP, RRSIG, NSEC, TLSA, HIP, 61, 99
|