View on GitHub

DNSViz: A DNS visualization tool

tcp53.ch

DNSSEC options (hide)
  1. |?|
  2. |?|
  3. |?|
  4. |?|
  5. |?|
  6. |?|
  7. |?|
  8. |?|
  9. |?|
  10. |?|
Notices
DNSSEC Authentication Chain

RRset statusRRset status

Bogus (1)
  • tcp53.ch/SOA
Secure (5)
  • tcp53.ch/A
  • tcp53.ch/MX
  • tcp53.ch/NS
  • tcp53.ch/SOA
  • tcp53.ch/TXT

DNSKEY/DS/NSEC statusDNSKEY/DS/NSEC status

Secure (8)
  • ./DNSKEY (alg 8, id 18733)
  • ./DNSKEY (alg 8, id 20326)
  • ch/DNSKEY (alg 13, id 11648)
  • ch/DNSKEY (alg 13, id 48609)
  • ch/DNSKEY (alg 13, id 56913)
  • ch/DS (alg 13, id 11648)
  • tcp53.ch/DNSKEY (alg 13, id 44444)
  • tcp53.ch/DS (alg 13, id 44444)

Delegation statusDelegation status

Secure (2)
  • . to ch
  • ch to tcp53.ch

NoticesNotices

Errors (13)
  • ch to tcp53.ch: No valid RRSIGs made by a key corresponding to a DS RR were found covering the DNSKEY RRset, resulting in no secure entry point (SEP) into the zone. See RFC 4035, Sec. 2.2, RFC 6840, Sec. 5.11. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
  • ch to tcp53.ch: The DS RRset for the zone included algorithm 13 (ECDSAP256SHA256), but no DS RR matched a DNSKEY with algorithm 13 that signs the zone's DNSKEY RRset. See RFC 4035, Sec. 2.2, RFC 6840, Sec. 5.11. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
  • tcp53.ch/A: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN)
  • tcp53.ch/DNSKEY (alg 13, id 44444): The DNSKEY RR was not found in the DNSKEY RRset returned by one or more servers. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
  • tcp53.ch/MX: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
  • tcp53.ch/NS: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN)
  • tcp53.ch/SOA: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
  • tcp53.ch/TXT: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (91.184.32.34, 178.33.39.66, 2001:41d0:304:200::c92a, 2a01:198:0:1::34, UDP_-_EDNS0_4096_D_KN)
  • tcp53.ch/DNSKEY has errors; select the "Denial of existence" DNSSEC option to see them.
  • tcp53.ch/CNAME has errors; select the "Denial of existence" DNSSEC option to see them.
  • jvnitebzad.tcp53.ch/A has errors; select the "Denial of existence" DNSSEC option to see them.
  • tcp53.ch/NSEC3PARAM has errors; select the "Denial of existence" DNSSEC option to see them.
  • tcp53.ch/AAAA has errors; select the "Denial of existence" DNSSEC option to see them.

DNSKEY legend

Full legend
SEP bit setSEP bit set
Revoke bit setRevoke bit set
Trust anchorTrust anchor
Download: png | svg
Warning JavaScript is required to make the graph below interactive.
DNSSEC authentication graph