View on GitHub
_25._tcp.mail1.gearnetwork.de
Updated:
2021-09-26 03:37:26 UTC
(
1153 days ago
)
Go to most recent »
« Previous analysis
|
Next analysis »
Tweet
DNSSEC
Responses
Servers
Analyze
DNSSEC options (
hide
)
|?|
RR types:
--All--
A
AAAA
TXT
PTR
MX
NS
SOA
CNAME
SRV
NAPTR
TLSA
NSEC3PARAM
CDNSKEY
CDS
CAA
|?|
DNSSEC algorithms:
--All--
1 - RSA/MD5
3 - DSA/SHA1
5 - RSA/SHA-1
6 - DSA-NSEC3-SHA1
7 - RSASHA1-NSEC3-SHA1
8 - RSA/SHA-256
10 - RSA/SHA-512
12 - GOST R 34.10-2001
13 - ECDSA Curve P-256 with SHA-256
14 - ECDSA Curve P-384 with SHA-384
15 - Ed25519
16 - Ed448
|?|
DS digest algorithms:
--All--
1 - SHA-1
2 - SHA-256
3 - GOST R 34.11-94
4 - SHA-384
|?|
Denial of existence:
|?|
Redundant edges:
|?|
Ignore RFC 8624:
|?|
Ignore RFC 9276:
|?|
Multi-signer:
|?|
Trust anchors:
Root zone KSK
|?|
Additional trusted keys:
Notices
DNSSEC Authentication Chain
RRset status
Secure
(2)
mail1.gearnetwork.de/A
mail1.gearnetwork.de/AAAA
DNSKEY/DS/NSEC status
Secure
(9)
./DNSKEY (alg 8, id 14748)
./DNSKEY (alg 8, id 20326)
./DNSKEY (alg 8, id 26838)
de/DNSKEY (alg 8, id 26755)
de/DNSKEY (alg 8, id 54729)
de/DS (alg 8, id 26755)
gearnetwork.de/DNSKEY (alg 13, id 2371)
gearnetwork.de/DNSKEY (alg 13, id 34505)
gearnetwork.de/DS (alg 13, id 2371)
Delegation status
Secure
(2)
. to de
de to gearnetwork.de
Notices
Errors
(1)
_25._tcp.mail1.gearnetwork.de/TLSA: The response had an invalid RCODE (SERVFAIL). See RFC 1035, Sec. 4.1.1. (108.162.192.62, 108.162.193.79, 172.64.32.62, 172.64.33.79, 173.245.58.62, 173.245.59.79, 2606:4700:50::adf5:3a3e, 2606:4700:58::adf5:3b4f, 2803:f800:50::6ca2:c03e, 2803:f800:50::6ca2:c14f, 2a06:98c1:50::ac40:203e, 2a06:98c1:50::ac40:214f, UDP_-_NOEDNS_)
DNSKEY legend
Full legend
SEP bit set
Revoke bit set
Trust anchor
See also
DNSSEC Debugger
by
Verisign Labs
.
Download:
png
|
svg
JavaScript is required to make the graph below interactive.