Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20826, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 47671, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.07.2022, 00:00:00 +, Signature-Inception: 01.07.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: xyz
|
|
xyz
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest P6OyZPRdtfOL7erxqIt2qjGMLH8=
|
|
|
|
|
| DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 14.07.2022, 19:00:00 +, Signature-Inception: 01.07.2022, 18:00:00 +, KeyTag 20826, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20826 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 3599, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53358, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner xyz., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 18.07.2022, 14:17:47 +, Signature-Inception: 18.06.2022, 16:54:04 +, KeyTag 3599, Signer-Name: xyz
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 3599 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 1 and Digest "P6OyZPRdtfOL7erxqIt2qjGMLH8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 3599, DigestType 2 and Digest "uXM4abyEyGu1nRArpdprJ7IIhVIzKjnc1UvE6NZrBJk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: wisemonkey.xyz
|
|
wisemonkey.xyz
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 18903, DigestType 2 and Digest VkTaXtMHDq8MDBNOLyMZIbNck40YQWViOQ7UZXY+IkY=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner wisemonkey.xyz., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 26.07.2022, 23:51:09 +, Signature-Inception: 27.06.2022, 01:59:25 +, KeyTag 53358, Signer-Name: xyz
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53358 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 18903, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 18903 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 18903, DigestType 2 and Digest "VkTaXtMHDq8MDBNOLyMZIbNck40YQWViOQ7UZXY+IkY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 18.221.48.104
Validated: RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issuetrust-provider.com
261|issueletsencrypt.org
Validated: RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "wisemonkey.xyz" equal the NSEC-owner "wisemonkey.xyz" and the NextOwner "searx.wisemonkey.xyz". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY, CAA Validated: RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "wisemonkey.xyz" equal the NSEC-owner "wisemonkey.xyz" and the NextOwner "searx.wisemonkey.xyz". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY, CAA Validated: RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "wisemonkey.xyz" equal the NSEC-owner "wisemonkey.xyz" and the NextOwner "searx.wisemonkey.xyz". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY, CAA Validated: RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.wisemonkey.xyz) sends a valid NSEC RR as result with the owner name wisemonkey.xyz. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "wisemonkey.xyz" and the NextOwner "searx.wisemonkey.xyz". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.wisemonkey.xyz) sends a valid NSEC RR as result with the query name "_443._tcp.wisemonkey.xyz" between the NSEC-owner "wisemonkey.xyz" and the NextOwner "searx.wisemonkey.xyz". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.wisemonkey.xyz) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.wisemonkey.xyz" between the NSEC-owner "wisemonkey.xyz" and the NextOwner "searx.wisemonkey.xyz". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY, CAA Validated: RRSIG-Owner wisemonkey.xyz., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
Zone: www.wisemonkey.xyz
|
|
www.wisemonkey.xyz
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: RRSIG, NSEC, CAA
|
|
|
|
|
| RRSIG Type 257 validates the CAA - Result: 5|issuetrust-provider.com
261|issueletsencrypt.org
Validated: RRSIG-Owner www.wisemonkey.xyz., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| A-Query sends a valid NSEC RR as result with the query name "www.wisemonkey.xyz" equal the NSEC-owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, CAA Validated: RRSIG-Owner www.wisemonkey.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.wisemonkey.xyz" equal the NSEC-owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, CAA Validated: RRSIG-Owner www.wisemonkey.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "www.wisemonkey.xyz" equal the NSEC-owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, CAA Validated: RRSIG-Owner www.wisemonkey.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC RR as result with the query name "www.wisemonkey.xyz" equal the NSEC-owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, CAA Validated: RRSIG-Owner www.wisemonkey.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.wisemonkey.xyz) sends a valid NSEC RR as result with the owner name www.wisemonkey.xyz. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.www.wisemonkey.xyz) sends a valid NSEC RR as result with the query name "_443._tcp.www.wisemonkey.xyz" between the NSEC-owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.www.wisemonkey.xyz) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.www.wisemonkey.xyz" between the NSEC-owner "www.wisemonkey.xyz" and the NextOwner "wisemonkey.xyz". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: RRSIG, NSEC, CAA Validated: RRSIG-Owner www.wisemonkey.xyz., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.07.2022, 00:00:00 +, Signature-Inception: 23.06.2022, 00:00:00 +, KeyTag 18903, Signer-Name: wisemonkey.xyz
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|