View on GitHub
normandystyle.site
Updated:
2022-06-04 19:57:32 UTC
(
703 days ago
)
Update now
« Previous analysis
|
Next analysis »
Tweet
DNSSEC
Responses
Servers
Analyze
DNSSEC options (
hide
)
|?|
RR types:
--All--
A
AAAA
TXT
PTR
MX
NS
SOA
CNAME
SRV
NAPTR
TLSA
NSEC3PARAM
CAA
|?|
DNSSEC algorithms:
--All--
1 - RSA/MD5
3 - DSA/SHA1
5 - RSA/SHA-1
6 - DSA-NSEC3-SHA1
7 - RSASHA1-NSEC3-SHA1
8 - RSA/SHA-256
10 - RSA/SHA-512
12 - GOST R 34.10-2001
13 - ECDSA Curve P-256 with SHA-256
14 - ECDSA Curve P-384 with SHA-384
15 - Ed25519
16 - Ed448
|?|
DS digest algorithms:
--All--
1 - SHA-1
2 - SHA-256
3 - GOST R 34.11-94
4 - SHA-384
|?|
Denial of existence:
|?|
Redundant edges:
|?|
Trust anchors:
Root zone KSK
|?|
Additional trusted keys:
Notices
DNSSEC Authentication Chain
RRset status
Secure
(2)
site/SOA
site/SOA
DNSKEY/DS/NSEC status
Secure
(8)
./DNSKEY (alg 8, id 20326)
./DNSKEY (alg 8, id 47671)
NSEC3 proving non-existence of normandystyle.site/DS
site/DNSKEY (alg 8, id 20704)
site/DNSKEY (alg 8, id 51676)
site/DNSKEY (alg 8, id 7629)
site/DS (alg 8, id 51676)
site/DS (alg 8, id 51676)
Delegation status
Lame
(1)
site to normandystyle.site
Secure
(1)
. to site
Notices
Errors
(11)
normandystyle.site zone: The server(s) responded over TCP with a malformed response or with an invalid RCODE. (163.44.242.7, 163.44.242.8)
normandystyle.site zone: The server(s) responded over UDP with a malformed response or with an invalid RCODE. (163.44.242.7, 163.44.242.8)
normandystyle.site/A: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN)
normandystyle.site/AAAA: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN)
normandystyle.site/DNSKEY: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
normandystyle.site/MX: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
normandystyle.site/NS: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN)
normandystyle.site/NSEC3PARAM: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN)
normandystyle.site/SOA: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, TCP_-_EDNS0_4096_D_N)
normandystyle.site/SOA: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
normandystyle.site/TXT: The response had an invalid RCODE (REFUSED). (163.44.242.7, 163.44.242.8, UDP_-_EDNS0_4096_D_KN)
Warnings
(5)
. to site: The following NS name(s) were found in the authoritative NS RRset, but not in the delegation NS RRset (i.e., in the . zone): g.nic.site
site/DS (alg 8, id 51676): DNSSEC specification prohibits signing with DS records that use digest algorithm 1 (SHA-1).
site/DS (alg 8, id 51676): DNSSEC specification prohibits signing with DS records that use digest algorithm 1 (SHA-1).
site/DS (alg 8, id 51676): DS records with digest type 1 (SHA-1) are ignored when DS records with digest type 2 (SHA-256) exist in the same RRset.
site/DS (alg 8, id 51676): DS records with digest type 1 (SHA-1) are ignored when DS records with digest type 2 (SHA-256) exist in the same RRset.
DNSKEY legend
Full legend
SEP bit set
Revoke bit set
Trust anchor
See also
DNSSEC Debugger
by
Verisign Labs
.
Download:
png
|
svg
JavaScript is required to make the graph below interactive.