View on GitHub

DNSViz: A DNS visualization tool

nohats.ca

DNSSEC options (hide)
  1. |?|
  2. |?|
  3. |?|
  4. |?|
  5. |?|
  6. |?|
  7. |?|
Notices
DNSSEC Authentication Chain

RRset statusRRset status

Bogus (5)
  • nohats.ca/A
  • nohats.ca/AAAA
  • nohats.ca/MX
  • nohats.ca/NS
  • nohats.ca/SOA

DNSKEY/DS/NSEC statusDNSKEY/DS/NSEC status

Bogus (3)
  • nohats.ca/DNSKEY (alg 8, id 1321)
  • nohats.ca/DNSKEY (alg 8, id 17400)
  • nohats.ca/DNSKEY (alg 8, id 18108)
Secure (6)
  • ./DNSKEY (alg 8, id 19036)
  • ./DNSKEY (alg 8, id 8230)
  • ca/DNSKEY (alg 8, id 10207)
  • ca/DNSKEY (alg 8, id 5655)
  • ca/DS (alg 8, id 10207)
  • nohats.ca/DS (alg 8, id 1321)

Delegation statusDelegation status

Bogus (1)
  • ca to nohats.ca
Secure (1)
  • . to ca

NoticesNotices

Errors (13)
  • RRSIG nohats.ca/A alg 8, id 17400: With a TTL of 86400 the RRSIG RR can be in the cache of a non-validating resolver until 2 hours, 7 minutes after it expires at 2014-09-20 00:36:40+00:00.
  • RRSIG nohats.ca/AAAA alg 8, id 17400: With a TTL of 86400 the RRSIG RR can be in the cache of a non-validating resolver until 11 hours, 39 minutes after it expires at 2014-09-19 15:04:43+00:00.
  • RRSIG nohats.ca/DNSKEY alg 8, id 1321: The Signature Expiration field of the RRSIG RR (2014-09-19 01:02:12+00:00) is 1 hour, 42 minutes in the past.
  • RRSIG nohats.ca/DNSKEY alg 8, id 1321: The Signature Expiration field of the RRSIG RR (2014-09-19 01:02:12+00:00) is 1 hour, 42 minutes in the past.
  • RRSIG nohats.ca/DNSKEY alg 8, id 1321: The Signature Expiration field of the RRSIG RR (2014-09-19 01:02:12+00:00) is 1 hour, 42 minutes in the past.
  • RRSIG nohats.ca/MX alg 8, id 17400: With a TTL of 86400 the RRSIG RR can be in the cache of a non-validating resolver until 20 hours, 2 minutes after it expires at 2014-09-19 06:42:05+00:00.
  • RRSIG nohats.ca/NS alg 8, id 17400: With a TTL of 86400 the RRSIG RR can be in the cache of a non-validating resolver until 22 hours, 46 minutes after it expires at 2014-09-19 03:58:22+00:00.
  • ca to nohats.ca: No valid RRSIGs made by a key corresponding to a DS RR were found covering the DNSKEY RRset, resulting in no secure entry point (SEP) into the zone. (81.22.252.185, 193.110.157.102, 2001:470:dd9e:d00:1::185, 2a03:6000:1004:1::102, UDP_0_EDNS0_32768_4096)
  • nohats.ca zone: The server(s) were not responsive to queries over UDP. (65.18.175.19, 2001:470:96:4::188)
  • nohats.ca/A: No response was received from the server over UDP (tried 8 times). (65.18.175.19, UDP_0_NOEDNS)
  • nohats.ca/A: There was an error communicating with the server over UDP (EACCES). (2001:470:96:4::188, UDP_0_EDNS0_32768_4096)
  • nohats.ca/NS: No response was received from the server over UDP (tried 8 times). (65.18.175.19, UDP_0_NOEDNS)
  • nohats.ca/NS: There was an error communicating with the server over UDP (EACCES). (2001:470:96:4::188, UDP_0_EDNS0_32768_4096)

DNSKEY legend

Full legend
SEP bit setSEP bit set
Revoke bit setRevoke bit set
Trust anchorTrust anchor
Download: png | svg
Warning JavaScript is required to make the graph below interactive.
DNSSEC authentication graph