m451.de. 86400 SOA ns.inwx.de. # Start Of Authority hostmaster.m451.de. # Mail-Addresse 2018090901 # Serialnumber 10800 # refresh 3600 # retry 604800 # expire 3600 # TTL m451.de. 86400 NS ns.inwx.de. # Nameserver m451.de. 86400 NS ns2.inwx.de. # Nameserver m451.de. 3600 IN A 185.11.138.5 m451.de. 3600 MX 100 mail.ideas-in-logic.de.
NS für www.m451.de -> x.root-server.net?: ".de -> NS a.nic.de" NS für www.m451.de -> a.nic.de?: "m451.de -> NS ns.inwx.de" A für www.m451.de -> ns.inwx.de?: "www.m451.de -> IN A 185.11.138.5"
> delv +vtrace +mtrace A www.m451.de ;; fetch: www.m451.de/A ;; received packet from 192.168.1.4#53 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10286 ;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1252 ;; QUESTION SECTION: ;www.m451.de. IN A ;; ANSWER SECTION: ;www.m451.de. 2796 IN A 185.11.138.5 ;www.m451.de. 2796 IN RRSIG A 13 3 3600 ( ; 20180922125042 20180908112042 13461 m451.de. ; FwYUGXWl6ThYkFBWH4z3fSyMO3yv ; O0HGRhb/tWYmCqxMsLQKVLAqfLX+ ; r1DTmueRHs+WCvmA0UCN15CfySmf ; Wg== ) ;; validating www.m451.de/A: starting ;; validating www.m451.de/A: attempting positive response validation ;; fetch: m451.de/DNSKEY ;; received packet from 192.168.1.4#53 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26443 ;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1252 ;; QUESTION SECTION: ;m451.de. IN DNSKEY ;; ANSWER SECTION: ;m451.de. 83644 IN DNSKEY 257 3 13 ( ; rr05gqdmgNBHZ40bBIMR9VocgwBF ; CZcgrCR7Gb87Y4YeIHDty8/IYVbr ; xAytrCuc8VG85Rc9Kjq+hDSjpc6f ; Qw== ; ) ; KSK; alg = ECDSAP256SHA256 ; key id = 16944 ;m451.de. 83644 IN DNSKEY 256 3 13 ( ; 0dNuGSiNHq66qU8s2Rf+Iiv5+/t+ ; aJE3tupLEbHqRZTHT4vIyhStGIrF ; XOZRiXpt2bZuQOnsFazmyb5hxMVn ; 1A== ; ) ; ZSK; alg = ECDSAP256SHA256 ; key id = 13461 ;m451.de. 83644 IN RRSIG DNSKEY 13 2 86400 ( ; 20180922135042 20180908122042 16944 m451.de. ; smH5bxe/ifa7xkTAIZrxkUrSKXdF ; 262xL+YS/jtalQhxEQAeYIZ+sJyg ; 0bWLO6Tg56TMz/TSRMEiL+FLOV+y ; fA== ) ;; validating m451.de/DNSKEY: starting ;; validating m451.de/DNSKEY: attempting positive response validation ;; fetch: m451.de/DS ;; received packet from 192.168.1.4#53 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50609 ;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1252 ;; QUESTION SECTION: ;m451.de. IN DS ;; ANSWER SECTION: ;m451.de. 83644 IN DS 16944 13 2 ( ; CFFEF6FB4C83737E5B5F2DE77FA8 ; 40149E09BD2721DE0F72EDB0C946 ; 9DC20CAE ) ;m451.de. 83644 IN RRSIG DS 8 2 86400 ( ; 20180918200125 20180911200125 33364 de. ; GDDxfC969C9VMleiJYQ6xi4TBJXo ; C/m9kZ3qGqXXGoLbq/F6eG0dyjb2 ; oXuzssfTRK/jxfvWpvvU9I1RA9ry ; lbgz4ZsTp+GpHCRcu4Qm5whYRNjG ; zauoJ/pNYIDi0ziEgwTAV01Pve6S ; 8SLktYaEsk/XKtXrgeASfo2vF28C ; RZg= ) ;; validating m451.de/DS: starting ;; validating m451.de/DS: attempting positive response validation ;; fetch: de/DNSKEY ;; received packet from 192.168.1.4#53 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3899 ;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1252 ;; QUESTION SECTION: ;de. IN DNSKEY ;; ANSWER SECTION: ;de. 4314 IN DNSKEY 257 3 8 ( ; AwEAAaZEsxM26e8MgLuWsLAeRd7B ; zNdJjvhfGbqQ1xxtYd4TPPqYr7Qc ; K9Em18VyYEnjqXOqVWBuOhCWnrij ; P5GiumIliap+LerHjTk3QCgim1qv ; w3k7UFOgwMe8yOl7hghG8Nbgw6Un ; VfmUD71TaGSwj1C5EO2guiXZkFPU ; p2UzmUmoe5EWwtzCni7L0RDl5MaR ; VhjUBEkPrAVI603GDTuwtRKZLTiy ; fc3Qmq/u83/6Knxot5pHp3reRcsp ; 0vk2G+RQubgDKsmaXCql4mPzR911 ; Di68vwbBfSyLZ0EOwVkrO7VJgr/R ; JJ37JlydfQfGmQ3Dkvw1h8ifZhRC ; 8oOkv8ynUXM= ; ) ; KSK; alg = RSASHA256 ; key id = 39227 ;de. 4314 IN DNSKEY 256 3 8 ( ; AwEAAbg/JmxwVhcxVUCgUIIywYIB ; rDpEgSeFIL9xwU7XmJgcgsF6/t0c ; LLnUydK/e/dam2pDyllUqaCZFRf9 ; qagYmgMIoZbvAylIcUqjjv7PjXLs ; aWC/Ir3ioXFEAUzXfNlsSOeyf3eS ; wz+DEOafc8+iwuPl5l3V2onV34Q8 ; x3i2CSlj ; ) ; ZSK; alg = RSASHA256 ; key id = 33364 ;de. 4314 IN RRSIG DNSKEY 8 1 7200 ( ; 20180927120000 20180906120000 39227 de. ; J5ATKKj37fEkKUsJVcsZGgZGa4ec ; nrTx5MYcq1OgBTuPXY4l83YTq7vy ; onUlLw+QU0hR4HnbPf4wz875VpgT ; NZaS8MpzgSfnZFoVrGQiHOLkIHzU ; 7Penf1NhEDip/R6UkvHiS/x747iD ; WjOc9MwV0XDDzngNftd5iyxfmAnB ; Pbjah5aX56C0+Wov1WXDXjnbOtop ; pbACwy3j40/hTcaHnNgRoE7K/c2n ; hwiHn9skSMxwlB1EsUcHa/Jvflba ; u5Jcqp0IlYEqwQt/BrtWFiTLOc2K ; G7/mmSc2Kv5//4odTL6jBIjT0Oi0 ; /cYD1oOiRTJpHgd08OqcOEuVvls+ ; sXFNZA== ) ;; validating de/DNSKEY: starting ;; validating de/DNSKEY: attempting positive response validation ;; fetch: de/DS ;; received packet from 192.168.1.4#53 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47427 ;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1252 ;; QUESTION SECTION: ;de. IN DS ;; ANSWER SECTION: ;de. 83507 IN DS 39227 8 2 ( ; AAB73083B9EF70E4A5E94769A418 ; AC12E887FC3C0875EF206C3451DC ; 40B6C4FA ) ;de. 83507 IN RRSIG DS 8 1 86400 ( ; 20180924190000 20180911180000 41656 . ; QOoEXnZGx6/uVqle8BODQWPhwb+b ; MT3SNTGRSWNc54JDkwsRilPfF29E ; zqyL7KDzoKdQ+nF063SHDf+PrOkh ; wgprZ2XGj+yp2FSiWiu2LfjkiOJ2 ; DLFzO4niUSvQTX/Px3RG/ctYLMuf ; 7PK3KtkN1h8FeN1/j7QrJZiFnqYp ; /fdgh8CREY5vkzNPdBOcBqdmvO9e ; se2NXWUlIf1KD+iqE3a5Gh7+OYI0 ; VCXiywB1sFSpIU8CKsDBcxCeRF7k ; XkRHbLqMWPaQQeod+NARo4xQsi+D ; 3SoShqi3zbkRLSnFbCxH1caLVBqI ; MOxybsb4quyi3zVDmkmhrnYxWLbn ; 9wLe+w== ) ;; validating de/DS: starting ;; validating de/DS: attempting positive response validation ;; fetch: ./DNSKEY ;; received packet from 192.168.1.4#53 ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5555 ;; flags: qr rd ra ad; QUESTION: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags: do; udp: 1252 ;; QUESTION SECTION: ;. IN DNSKEY ;; ANSWER SECTION: ;. 169897 IN DNSKEY 257 3 8 ( ; AwEAAaz/tAm8yTn4Mfeh5eyI96WS ; VexTBAvkMgJzkKTOiW1vkIbzxeF3 ; +/4RgWOq7HrxRixHlFlExOLAJr5e ; mLvN7SWXgnLh4+B5xQlNVz8Og8kv ; ArMtNROxVQuCaSnIDdD5LKyWbRd2 ; n9WGe2R8PzgCmr3EgVLrjyBxWezF ; 0jLHwVN8efS3rCj/EWgvIWgb9tar ; pVUDK/b58Da+sqqls3eNbuv7pr+e ; oZG+SrDK6nWeL3c6H5Apxz7LjVc1 ; uTIdsIXxuOLYA4/ilBmSVIzuDWfd ; RUfhHdY6+cn8HFRm+2hM8AnXGXws ; 9555KrUB5qihylGa8subX2Nn6UwN ; R1AkUTV74bU= ; ) ; KSK; alg = RSASHA256 ; key id = 20326 ;. 169897 IN DNSKEY 257 3 8 ( ; AwEAAagAIKlVZrpC6Ia7gEzahOR+ ; 9W29euxhJhVVLOyQbSEW0O8gcCjF ; FVQUTf6v58fLjwBd0YI0EzrAcQqB ; GCzh/RStIoO8g0NfnfL2MTJRkxoX ; bfDaUeVPQuYEhg37NZWAJQ9VnMVD ; xP/VHL496M/QZxkjf5/Efucp2gaD ; X6RS6CXpoY68LsvPVjR0ZSwzz1ap ; AzvN9dlzEheX7ICJBBtuA6G3LQpz ; W5hOA2hzCTMjJPJ8LbqF6dsV6DoB ; Qzgul0sGIcGOYl7OyQdXfZ57relS ; Qageu+ipAdTTJ25AsRTAoub8ONGc ; LmqrAmRLKBP1dfwhYB4N7knNnulq ; QxA+Uk1ihz0= ; ) ; KSK; alg = RSASHA256 ; key id = 19036 ;. 169897 IN DNSKEY 256 3 8 ( ; AwEAAfaifSqh+9ItxYRCwuiY0FY2 ; NkaEwd/zmyVvakixDgTOkgG/PUzl ; EauAiKzlxGwezjqbKFPSwrY3qHmb ; bsSTY6G8hZtna8k26eCwy59Chh57 ; 3cu8qtBkmUIXMYG3fSdlUReP+uhB ; WBfKI2aGwhRmQYR0zSmg7PGOde34 ; c/rOItK1ebJhjTAJ6TmnON7qMfk/ ; lKvH4qOvYtzstLhr7Pn9ZOVLx/WU ; KQpU/nEyFyTduRbz1nZqkp6yMuHw ; WVsABK8lUYXSaUrDAsuMSldhafmR ; /A15BxNhv9M7mzJj7UH2RVME9JbY ; inBEzWwW9GpnY+ZmBWgZiRVTaDue ; mCTJ5ZJWLRs= ; ) ; ZSK; alg = RSASHA256 ; key id = 41656 ;. 169897 IN RRSIG DNSKEY 8 0 172800 ( ; 20180930000000 20180909000000 19036 . ; GvFso1C76Dk79nt07sVCwGm/Hw3Q ; ytVpQ0VnxEc2uI3iJnD7Bls2cmyA ; egT1USX4qY/j+1+j88xhwDVnM21w ; 8fyAppbbea0Ri4gfM4562KNIrUBD ; JCybijL+4GbTwwq8Z2RKqDjTkEHx ; vQ7KCV+9ldtzcpzF7FE4ct3rzaEQ ; T6APVR70dxH+lc/JL1PVdM9zeclh ; tmRBrfRJHdU9XfqY3PycubLxWtZL ; NOUqB2gBxwvfK6zg1VCZ8JQCDIfE ; VyWae1WEooBvHAq4obNJs6rF9JC3 ; qnc5WxIqBZnWD41NkZMbOqvBxJvk ; Liwvp98qOCkvbKTbneFA0q3ZGtwN ; OBhajA== ) ;; validating ./DNSKEY: starting ;; validating ./DNSKEY: attempting positive response validation ;; validating ./DNSKEY: verify rdataset (keyid=19036): success ;; validating ./DNSKEY: signed by trusted key; marking as secure ;; validating de/DS: in fetch_callback_validator ;; validating de/DS: keyset with trust secure ;; validating de/DS: resuming validate ;; validating de/DS: verify rdataset (keyid=41656): success ;; validating de/DS: marking as secure, noqname proof not needed ;; validating de/DNSKEY: in dsfetched ;; validating de/DNSKEY: dsset with trust secure ;; validating de/DNSKEY: verify rdataset (keyid=39227): success ;; validating de/DNSKEY: marking as secure (DS) ;; validating m451.de/DS: in fetch_callback_validator ;; validating m451.de/DS: keyset with trust secure ;; validating m451.de/DS: resuming validate ;; validating m451.de/DS: verify rdataset (keyid=33364): success ;; validating m451.de/DS: marking as secure, noqname proof not needed ;; validating m451.de/DNSKEY: in dsfetched ;; validating m451.de/DNSKEY: dsset with trust secure ;; validating m451.de/DNSKEY: verify rdataset (keyid=16944): success ;; validating m451.de/DNSKEY: marking as secure (DS) ;; validating www.m451.de/A: in fetch_callback_validator ;; validating www.m451.de/A: keyset with trust secure ;; validating www.m451.de/A: resuming validate ;; validating www.m451.de/A: verify rdataset (keyid=13461): success ;; validating www.m451.de/A: marking as secure, noqname proof not needed ; fully validated www.m451.de. 2796 IN A 185.11.138.5 www.m451.de. 2796 IN RRSIG A 13 3 3600 20180922125042 20180908112042 13461 m451.de. Fw...g==
www.m451.de. 3297 IN A 185.11.138.5 www.m451.de. 3297 IN RRSIG A # Signatur zum A-Record 13 # Signaturverfahren -> ECDSAP256SHA256 3 # Name besteht aus 3 Komponenten 3600 # TTL der Antwort 20180922125042 # not valid before 20180908112042 # not valid after 13461 # Schlüssel ID m451.de. # Name des Signierers FwYUGXWl6ThYk...SmfWg== # base64 signatur
_25._tcp.mail.ideas-in-logic.de. 3600 IN TLSA 3 1 1 AD1...28 _25._tcp.mail.ideas-in-logic.de. 3600 IN TLSA 2 1 1 60B...18
policy: - id: "default" algorithm: "ecdsap256sha256" nsec3: "on" nsec3-iterations: "100" template: - id: "default" storage: "/var/lib/knot/zones" notify: "slave" acl: [ "acl_slave", "deny_all" ] dnssec-signing: "on" dnssec-policy: "default" serial-policy: "dateserial"
delv +vtrace +mtrace m451.de