Zone (*) | DNSSEC - Informations |
---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 11019, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.08.2023, 00:00:00 +, Signature-Inception: 21.07.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: no
|
|
no
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 38032, DigestType 2 and Digest bTdNdp0eQ4ixpUmm2i99iTcdtquqU9IO7HCETbQGLlE=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner no., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.08.2023, 21:00:00 +, Signature-Inception: 24.07.2023, 20:00:00 +, KeyTag 11019, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 11019 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 37317, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 38032, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner no., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 06.08.2023, 19:43:47 +, Signature-Inception: 23.07.2023, 19:02:37 +, KeyTag 38032, Signer-Name: no
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 38032 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 38032, DigestType 2 and Digest "bTdNdp0eQ4ixpUmm2i99iTcdtquqU9IO7HCETbQGLlE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: yartys.no
|
|
yartys.no
| 2 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 56034, DigestType 2 and Digest xUYXQdQuK+3AmoiD4x5THVmkzZp2ezHOTRMYe4UqvaE=
|
|
|
|
|
| DS with Algorithm 13, KeyTag 56034, DigestType 4 and Digest rA32QfcfjKMP5PY5nyc9tt+6KsEPViFAi+FxlclmnzOGXdgVkDguQohQoG/ydC9x
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner yartys.no., Algorithm: 13, 2 Labels, original TTL: 7200 sec, Signature-expiration: 06.08.2023, 02:55:22 +, Signature-Inception: 24.07.2023, 03:05:13 +, KeyTag 37317, Signer-Name: no
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37317 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 28878, Flags 256
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 56034, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 2 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner yartys.no., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| RRSIG-Owner yartys.no., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 56034, Signer-Name: yartys.no
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 28878 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 56034 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 56034, DigestType 2 and Digest "xUYXQdQuK+3AmoiD4x5THVmkzZp2ezHOTRMYe4UqvaE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 56034, DigestType 4 and Digest "rA32QfcfjKMP5PY5nyc9tt+6KsEPViFAi+FxlclmnzOGXdgVkDguQohQoG/ydC9x" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:_spf.protonmail.ch mx ~all
protonmail-verification=e316c9d19bb1d5c9f1c7f2ac70125ce9c7d0a94f
Validated: RRSIG-Owner yartys.no., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2A07:0040:0040:000A:0000:52A2:EF1B:0994
Validated: RRSIG-Owner yartys.no., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| A-Query sends a valid NSEC3 RR as result with the hashed query name "1n14gc9k7t4oj39kdce3jvumaa7ruahb" equal the hashed NSEC3-owner "1n14gc9k7t4oj39kdce3jvumaa7ruahb" and the hashed NextOwner "ckrsj320vfgd86r1l26cql3c5rfjkj06". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 1n14gc9k7t4oj39kdce3jvumaa7ruahb.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "1n14gc9k7t4oj39kdce3jvumaa7ruahb" equal the hashed NSEC3-owner "1n14gc9k7t4oj39kdce3jvumaa7ruahb" and the hashed NextOwner "ckrsj320vfgd86r1l26cql3c5rfjkj06". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 1n14gc9k7t4oj39kdce3jvumaa7ruahb.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.yartys.no) sends a valid NSEC3 RR as result with the hashed owner name "1n14gc9k7t4oj39kdce3jvumaa7ruahb" (unhashed: yartys.no). So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "b5kobtm774t9m2gmektsv2ke21nt480d" (unhashed: _tcp.yartys.no) with the owner "1n14gc9k7t4oj39kdce3jvumaa7ruahb" and the NextOwner "ckrsj320vfgd86r1l26cql3c5rfjkj06". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 1n14gc9k7t4oj39kdce3jvumaa7ruahb.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "ldm3jdod707ac9lnbqr8g2lntimvjg2i" (unhashed: *.yartys.no) with the owner "ghva75dptb9ej1s2bvaqjshbb3oha72u" and the NextOwner "t5nqjedcsrhh1e0hkbnptqmb3ppefpof". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner ghva75dptb9ej1s2bvaqjshbb3oha72u.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "1n14gc9k7t4oj39kdce3jvumaa7ruahb" equal the hashed NSEC3-owner "1n14gc9k7t4oj39kdce3jvumaa7ruahb" and the hashed NextOwner "ckrsj320vfgd86r1l26cql3c5rfjkj06". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 1n14gc9k7t4oj39kdce3jvumaa7ruahb.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.yartys.no
|
|
www.yartys.no
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" between the hashed NSEC3-owner "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" and the hashed NextOwner "eaqq0am7pd7u6vop38fg57p295dljl78". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: AAAA, RRSIG Validated: RRSIG-Owner dc24n9ntjccp7jjnvn87v1m5hggqdmsv.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2A07:0040:0040:000A:0000:52A2:EF1B:0994
Validated: RRSIG-Owner www.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| A-Query sends a valid NSEC3 RR as result with the hashed query name "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" equal the hashed NSEC3-owner "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" and the hashed NextOwner "eaqq0am7pd7u6vop38fg57p295dljl78". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: AAAA, RRSIG Validated: RRSIG-Owner dc24n9ntjccp7jjnvn87v1m5hggqdmsv.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" equal the hashed NSEC3-owner "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" and the hashed NextOwner "eaqq0am7pd7u6vop38fg57p295dljl78". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: AAAA, RRSIG Validated: RRSIG-Owner dc24n9ntjccp7jjnvn87v1m5hggqdmsv.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" equal the hashed NSEC3-owner "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" and the hashed NextOwner "eaqq0am7pd7u6vop38fg57p295dljl78". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: AAAA, RRSIG Validated: RRSIG-Owner dc24n9ntjccp7jjnvn87v1m5hggqdmsv.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.yartys.no) sends a valid NSEC3 RR as result with the hashed owner name "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" (unhashed: www.yartys.no). So that's the Closest Encloser of the query name.
Bitmap: AAAA, RRSIG Validated: RRSIG-Owner dc24n9ntjccp7jjnvn87v1m5hggqdmsv.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "mchu1lvv8k5kt3dau9i38miegk4uj0v3" (unhashed: _tcp.www.yartys.no) with the owner "ghva75dptb9ej1s2bvaqjshbb3oha72u" and the NextOwner "t5nqjedcsrhh1e0hkbnptqmb3ppefpof". So that NSEC3 confirms the not-existence of the Next Closer Name. TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "ptj578n4fo02c8f20bamjhic47ondbso" (unhashed: *.www.yartys.no) with the owner "ghva75dptb9ej1s2bvaqjshbb3oha72u" and the NextOwner "t5nqjedcsrhh1e0hkbnptqmb3ppefpof". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner ghva75dptb9ej1s2bvaqjshbb3oha72u.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" equal the hashed NSEC3-owner "dc24n9ntjccp7jjnvn87v1m5hggqdmsv" and the hashed NextOwner "eaqq0am7pd7u6vop38fg57p295dljl78". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: AAAA, RRSIG Validated: RRSIG-Owner dc24n9ntjccp7jjnvn87v1m5hggqdmsv.yartys.no., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.08.2023, 21:17:13 +, Signature-Inception: 19.07.2023, 21:17:13 +, KeyTag 28878, Signer-Name: yartys.no
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|