View on GitHub
tcp53.ch
Updated:
2022-10-31 15:13:10 UTC
(
782 days ago
)
Go to most recent »
« Previous analysis
|
Next analysis »
Tweet
DNSSEC
Responses
Servers
Analyze
DNSSEC options (
hide
)
|?|
RR types:
--All--
A
AAAA
TXT
PTR
MX
NS
SOA
CNAME
SRV
NAPTR
TLSA
NSEC3PARAM
CDNSKEY
CDS
CAA
|?|
DNSSEC algorithms:
--All--
1 - RSA/MD5
3 - DSA/SHA1
5 - RSA/SHA-1
6 - DSA-NSEC3-SHA1
7 - RSASHA1-NSEC3-SHA1
8 - RSA/SHA-256
10 - RSA/SHA-512
12 - GOST R 34.10-2001
13 - ECDSA Curve P-256 with SHA-256
14 - ECDSA Curve P-384 with SHA-384
15 - Ed25519
16 - Ed448
|?|
DS digest algorithms:
--All--
1 - SHA-1
2 - SHA-256
3 - GOST R 34.11-94
4 - SHA-384
|?|
Denial of existence:
|?|
Redundant edges:
|?|
Ignore RFC 8624:
|?|
Ignore RFC 9276:
|?|
Multi-signer:
|?|
Trust anchors:
Root zone KSK
|?|
Additional trusted keys:
Notices
DNSSEC Authentication Chain
RRset status
Insecure
(5)
tcp53.ch/A
tcp53.ch/MX
tcp53.ch/NS
tcp53.ch/SOA
tcp53.ch/TXT
Secure
(1)
ch/SOA
DNSKEY/DS/NSEC status
Insecure
(1)
tcp53.ch/DNSKEY (alg 13, id 44444)
Secure
(7)
./DNSKEY (alg 8, id 18733)
./DNSKEY (alg 8, id 20326)
NSEC3 proving non-existence of tcp53.ch/DS
ch/DNSKEY (alg 13, id 11648)
ch/DNSKEY (alg 13, id 5551)
ch/DNSKEY (alg 13, id 56913)
ch/DS (alg 13, id 11648)
Delegation status
Insecure
(1)
ch to tcp53.ch
Secure
(1)
. to ch
Notices
Errors
(1)
RRSIG tcp53.ch/NS alg 13, id 44444: The cryptographic signature of the RRSIG RR does not properly validate. See RFC 4035, Sec. 5.3.3.
DNSKEY legend
Full legend
SEP bit set
Revoke bit set
Trust anchor
See also
DNSSEC Debugger
by
Verisign Labs
.
Download:
png
|
svg
JavaScript is required to make the graph below interactive.