Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 951, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18733, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.01.2023, 00:00:00 +, Signature-Inception: 20.12.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.01.2023, 17:00:00 +, Signature-Inception: 26.12.2022, 16:00:00 +, KeyTag 18733, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18733 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 53929, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 05.01.2023, 18:24:21 +, Signature-Inception: 21.12.2022, 18:19:21 +, KeyTag 30909, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: quintelaseoane.com
|
|
quintelaseoane.com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 62577, DigestType 2 and Digest MIZozbLzPOU7cbeRTVOJeM1t4u5jNfKk9YoB6fgTSyM=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner quintelaseoane.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 01.01.2023, 06:18:17 +, Signature-Inception: 25.12.2022, 05:08:17 +, KeyTag 53929, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53929 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 62577, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner quintelaseoane.com., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 62577 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 62577, DigestType 2 and Digest "MIZozbLzPOU7cbeRTVOJeM1t4u5jNfKk9YoB6fgTSyM=" validates local Key with the same values
|
|
|
Zone: www3.quintelaseoane.com
|
|
www3.quintelaseoane.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| RRSIG Type 5 validates the CNAME - Result: coruna.trasno.org
Validated: RRSIG-Owner www3.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
Zone: www.www3.quintelaseoane.com
|
|
www.www3.quintelaseoane.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "51ah84jf02gun7ejn8kv47qet36beqt2" between the hashed NSEC3-owner "51ah84jf02gun7ejn8kv47qet36beqt1" and the hashed NextOwner "51ah84jf02gun7ejn8kv47qet36beqt3". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner 51ah84jf02gun7ejn8kv47qet36beqt1.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
|
|
| DS-Query in the parent zone sends valid NSEC3 RR with the Hash "e3g1pkuqmhn10o0a1birflijkq3s843p" as Owner. That's the Hash of "www3.quintelaseoane.com" with the NextHashedOwnerName "e3g1pkuqmhn10o0a1birflijkq3s843q". So that domain name is the Closest Encloser of "www.www3.quintelaseoane.com". Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner e3g1pkuqmhn10o0a1birflijkq3s843p.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
|
|
| The ClosestEncloser says, that "*.www3.quintelaseoane.com" with the Hash "sjagkag2c9n1d6dc7nb7o5hn9dje66c4" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "sjagkag2c9n1d6dc7nb7o5hn9dje66c3" and the Next Owner "sjagkag2c9n1d6dc7nb7o5hn9dje66c5", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: No Bitmap? Validated: RRSIG-Owner sjagkag2c9n1d6dc7nb7o5hn9dje66c3.quintelaseoane.com., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 62577, Signer-Name: quintelaseoane.com
|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 951, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 18733, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.01.2023, 00:00:00 +, Signature-Inception: 20.12.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: org
|
|
org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.01.2023, 17:00:00 +, Signature-Inception: 26.12.2022, 16:00:00 +, KeyTag 18733, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18733 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 16239, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 37749, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 15.01.2023, 15:24:05 +, Signature-Inception: 25.12.2022, 14:24:05 +, KeyTag 26974, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: trasno.org
|
|
trasno.org
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 25995, DigestType 2 and Digest YJpyGz6HIP/0JnjnSKnCrTQI4sASDIma6mmlf7GrsbM=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner trasno.org., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 15.01.2023, 15:24:05 +, Signature-Inception: 25.12.2022, 14:24:05 +, KeyTag 37749, Signer-Name: org
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 37749 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 25995, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner trasno.org., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 25995 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 25995, DigestType 2 and Digest "YJpyGz6HIP/0JnjnSKnCrTQI4sASDIma6mmlf7GrsbM=" validates local Key with the same values
|
|
|
Zone: coruna.trasno.org
|
|
coruna.trasno.org
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" between the hashed NSEC3-owner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" and the hashed NextOwner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni1". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner 4mrs46dn1ga0aip8ghd1rlohvvfb7ni0.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| 0 DNSKEY RR found
|
|
|
|
|
|
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 95.63.62.179
Validated: RRSIG-Owner coruna.trasno.org., Algorithm: 13, 3 Labels, original TTL: 3601 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 a -all
Validated: RRSIG-Owner coruna.trasno.org., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| RRSIG Type 52 validates the TLSA - Result (_443._tcp.coruna.trasno.org): _443._tcp.coruna.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 276fe8a8c4ec7611565bf9fce6dcace9be320c1b5bea27596b2204071ed04f10
_443._tcp.coruna.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
_443._tcp.coruna.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: bd936e72b212ef6f773102c6b77d38f94297322efc25396bc3279422e0c89270
_443._tcp.coruna.trasno.org: CertUsage 2 (DANE-TA, Trust anchor assertion), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: e5545e211347241891c554a03934cde9b749664a59d26d615fe58f77990f2d03
_443._tcp.coruna.trasno.org: CertUsage 3 (DANE-EE, Domain-issued certificate), Selector: 1 (SPKI, SubjectPublicKeyInfo), Matching: 1 (SHA2-256, 256 bit hash by SHA2), CertificateAssociationData: 6e8b0a8e900b33ca1ac998860cc4c80a84526b96701b52a7c3bd847f1292a1dd
Validated: RRSIG-Owner _443._tcp.coruna.trasno.org., Algorithm: 13, 5 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" equal the hashed NSEC3-owner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" and the hashed NextOwner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni1". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner 4mrs46dn1ga0aip8ghd1rlohvvfb7ni0.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" equal the hashed NSEC3-owner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" and the hashed NextOwner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni1". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner 4mrs46dn1ga0aip8ghd1rlohvvfb7ni0.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" equal the hashed NSEC3-owner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni0" and the hashed NextOwner "4mrs46dn1ga0aip8ghd1rlohvvfb7ni1". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, TXT, RRSIG Validated: RRSIG-Owner 4mrs46dn1ga0aip8ghd1rlohvvfb7ni0.trasno.org., Algorithm: 13, 3 Labels, original TTL: 10800 sec, Signature-expiration: 05.01.2023, 00:00:00 +, Signature-Inception: 15.12.2022, 00:00:00 +, KeyTag 25995, Signer-Name: trasno.org
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|