View on GitHub
tcp53.ch
Updated:
2022-11-09 13:58:09 UTC
(
774 days ago
)
Go to most recent »
« Previous analysis
|
Next analysis »
Tweet
DNSSEC
Responses
Servers
Analyze
DNSSEC options (
hide
)
|?|
RR types:
--All--
A
AAAA
TXT
PTR
MX
NS
SOA
CNAME
SRV
NAPTR
TLSA
NSEC3PARAM
CDNSKEY
CDS
CAA
|?|
DNSSEC algorithms:
--All--
1 - RSA/MD5
3 - DSA/SHA1
5 - RSA/SHA-1
6 - DSA-NSEC3-SHA1
7 - RSASHA1-NSEC3-SHA1
8 - RSA/SHA-256
10 - RSA/SHA-512
12 - GOST R 34.10-2001
13 - ECDSA Curve P-256 with SHA-256
14 - ECDSA Curve P-384 with SHA-384
15 - Ed25519
16 - Ed448
|?|
DS digest algorithms:
--All--
1 - SHA-1
2 - SHA-256
3 - GOST R 34.11-94
4 - SHA-384
|?|
Denial of existence:
|?|
Redundant edges:
|?|
Ignore RFC 8624:
|?|
Ignore RFC 9276:
|?|
Multi-signer:
|?|
Trust anchors:
Root zone KSK
|?|
Additional trusted keys:
Notices
DNSSEC Authentication Chain
RRset status
Bogus
(1)
tcp53.ch/NS
Secure
(4)
tcp53.ch/A
tcp53.ch/MX
tcp53.ch/SOA
tcp53.ch/TXT
DNSKEY/DS/NSEC status
Secure
(8)
./DNSKEY (alg 8, id 18733)
./DNSKEY (alg 8, id 20326)
ch/DNSKEY (alg 13, id 11648)
ch/DNSKEY (alg 13, id 48609)
ch/DNSKEY (alg 13, id 56913)
ch/DS (alg 13, id 11648)
tcp53.ch/DNSKEY (alg 13, id 44444)
tcp53.ch/DS (alg 13, id 44444)
Delegation status
Secure
(2)
. to ch
ch to tcp53.ch
Notices
Errors
(1)
RRSIG tcp53.ch/NS alg 13, id 44444: The cryptographic signature of the RRSIG RR does not properly validate. See RFC 4035, Sec. 5.3.3.
DNSKEY legend
Full legend
SEP bit set
Revoke bit set
Trust anchor
See also
DNSSEC Debugger
by
Verisign Labs
.
Download:
png
|
svg
JavaScript is required to make the graph below interactive.