Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 951, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18733, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.01.2023, 00:00:00 +, Signature-Inception: 20.12.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.01.2023, 17:00:00 +, Signature-Inception: 26.12.2022, 16:00:00 +, KeyTag 18733, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18733 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53929, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 05.01.2023, 18:24:21 +, Signature-Inception: 21.12.2022, 18:19:21 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: quintelaseoane.com
|
|
quintelaseoane.com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 62577, DigestType 2 and Digest MIZozbLzPOU7cbeRTVOJeM1t4u5jNfKk9YoB6fgTSyM=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner quintelaseoane.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 01.01.2023, 06:18:17 +, Signature-Inception: 25.12.2022, 05:08:17 +, KeyTag 53929, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53929 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 62577, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner quintelaseoane.com., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 62577 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 62577, DigestType 2 and Digest "MIZozbLzPOU7cbeRTVOJeM1t4u5jNfKk9YoB6fgTSyM=" validates local Key with the same values
|
|
|
Zone: www2.quintelaseoane.com
|
|
www2.quintelaseoane.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: sada.trasno.org
Validated: RRSIG-Owner www2.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
Zone: www.www2.quintelaseoane.com
|
|
www.www2.quintelaseoane.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "snq9mis9utd24fo5s9vj7rqb09iaaacf" between the hashed NSEC3-owner "snq9mis9utd24fo5s9vj7rqb09iaaace" and the hashed NextOwner "snq9mis9utd24fo5s9vj7rqb09iaaacg". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner snq9mis9utd24fo5s9vj7rqb09iaaace.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
|
|
| DS-Query in the parent zone sends valid NSEC3 RR with the Hash "66tqc0sbrsfg55k0otgr2ic4mfbdlgir" as Owner. That's the Hash of "www2.quintelaseoane.com" with the NextHashedOwnerName "66tqc0sbrsfg55k0otgr2ic4mfbdlgis". So that domain name is the Closest Encloser of "www.www2.quintelaseoane.com". Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 66tqc0sbrsfg55k0otgr2ic4mfbdlgir.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
|
|
| The ClosestEncloser says, that "*.www2.quintelaseoane.com" with the Hash "3inio4f1n2kf6j1hf5i5ilr8oqno66m6" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "3inio4f1n2kf6j1hf5i5ilr8oqno66m5" and the Next Owner "3inio4f1n2kf6j1hf5i5ilr8oqno66m7", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: No Bitmap? Validated: RRSIG-Owner 3inio4f1n2kf6j1hf5i5ilr8oqno66m5.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 951, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18733, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.01.2023, 00:00:00 +, Signature-Inception: 20.12.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.01.2023, 17:00:00 +, Signature-Inception: 26.12.2022, 16:00:00 +, KeyTag 18733, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18733 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 16239, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 37749, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 15.01.2023, 15:24:05 +, Signature-Inception: 25.12.2022, 14:24:05 +, KeyTag 26974, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: trasno.org
|
|
trasno.org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 25995, DigestType 2 and Digest YJpyGz6HIP/0JnjnSKnCrTQI4sASDIma6mmlf7GrsbM=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner trasno.org., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 15.01.2023, 15:24:05 +, Signature-Inception: 25.12.2022, 14:24:05 +, KeyTag 37749, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 37749 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 25995, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner trasno.org., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 25995 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 25995, DigestType 2 and Digest "YJpyGz6HIP/0JnjnSKnCrTQI4sASDIma6mmlf7GrsbM=" validates local Key with the same values
|
|
|
Zone: sada.trasno.org
|
|
sada.trasno.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "uo5bmt8g72rqqang3jg8ddi0ng06mchj" between the hashed NSEC3-owner "uo5bmt8g72rqqang3jg8ddi0ng06mchj" and the hashed NextOwner "uo5bmt8g72rqqang3jg8ddi0ng06mchk". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner uo5bmt8g72rqqang3jg8ddi0ng06mchj.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 46.136.252.173
Validated: RRSIG-Owner sada.trasno.org., Algorithm: 13, 3 Labels, original TTL: 3601 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 a -all
Validated: RRSIG-Owner sada.trasno.org., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.sada.trasno.org): _443._tcp.sada.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10
_443._tcp.sada.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
_443._tcp.sada.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270
_443._tcp.sada.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03
_443._tcp.sada.trasno.org: CertUsage 3 (DANE-EE, Domain-issued certificate), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 499b5b8383a6dfd7a3583b773c73fabbf8294445591228e3fdaecd50c0cae0ec
Validated: RRSIG-Owner _443._tcp.sada.trasno.org., Algorithm: 13, 5 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "uo5bmt8g72rqqang3jg8ddi0ng06mchj" equal the hashed NSEC3-owner "uo5bmt8g72rqqang3jg8ddi0ng06mchj" and the hashed NextOwner "uo5bmt8g72rqqang3jg8ddi0ng06mchk". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner uo5bmt8g72rqqang3jg8ddi0ng06mchj.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "uo5bmt8g72rqqang3jg8ddi0ng06mchj" equal the hashed NSEC3-owner "uo5bmt8g72rqqang3jg8ddi0ng06mchj" and the hashed NextOwner "uo5bmt8g72rqqang3jg8ddi0ng06mchk". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner uo5bmt8g72rqqang3jg8ddi0ng06mchj.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "uo5bmt8g72rqqang3jg8ddi0ng06mchj" equal the hashed NSEC3-owner "uo5bmt8g72rqqang3jg8ddi0ng06mchj" and the hashed NextOwner "uo5bmt8g72rqqang3jg8ddi0ng06mchk". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner uo5bmt8g72rqqang3jg8ddi0ng06mchj.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|